-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_kubernetes_cluster - support for the only_critical_addons_enabled
property
#10307
azurerm_kubernetes_cluster - support for the only_critical_addons_enabled
property
#10307
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @favoretti
Thanks for this PR / pushing those changes - taking a look through if we can fix up the minor comments then this otherwise LGTM 👍
Thanks!
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - thanks for pushing those changes @favoretti
@tombuildsstuff sorry for chiming in but these changes aren't correct as API allows multiple soft taints + strict hard taint. |
@t3mi can you give a little more context? The default node pool and additional node pools have different constraints for these fields - so this is only affecting the Default Node Pool? |
I'm talking about default node pool as I haven't checked constraints for ordinary ones. |
@t3mi If I remove |
@favoretti I'm not a decision maker here, just shared my concerns. From my point it doesn't make sense in introducing separate parameter just to remove it later for soft taints as its not needed. Soft taints are the ones with effect Validation from the API just for reference: |
@t3mi Ok, I flipped this option to a hard taint for now, to allow for this to make it to the next release and for people to keep their clusters clean, let's talk about reintroducing general soft taints on default node pool in a separate change? |
Acceptance test still passes after the last changes. |
It seems this missed the boat for 2.46 :( Since the CI is green, is there anything preventing this PR being merged so it can make it in the next release? |
I'm also wondering the same. I was tracking it yesterday and it was there as green. Could you please elaborate why it was moved to v.2.47.0 @tombuildsstuff ? Thanks! |
Mainly due to $reasons and the fact that acceptance tests take over 12 hours. I hope Tom will merge it early next week and it ships Thursday. Edit: CI on GH doesn't run acceptance, it happens elsewhere. |
only_critical_addons_enabled
property
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @favoretti - LGTM 👍
This has been released in version 2.47.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.47.0"
}
# ... other configuration ... |
@favoretti We tried internally with this version and the error persists. "Error: expanding To change only_critical_addons_enabled requires cluster to be recreated. This means that minor version in azure provider are not safe at all. |
@Cyanopus |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Fixes #9183