-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RDS Enhanced Monitoring MonitoringRoleARN value is required #5455
Comments
still playing around with this... Removing the role and the policy and trying again I get this error first:
then trying again I get the I also have the depends_on defined on the aws_db_instance resource |
Ensuring role created before policy attachment fixed this issue for me
|
That wasn't it.. looks like theres an issue with attaching the policy to multiple roles across regions. The last one ran gets the attached profile while the rest are blank. Instead of using attach policy resource I created a custom policy with the enhanced policy.
|
@deanmraz this was a really good find. Is this now resolved? |
@stack72 yup confirmed its working! |
Nice thanks for this @deanmraz |
We cannot find consistent documentation of what is required to get the policy setup in order to enable RDS enhanced logging with Terraform, but I did come across another couple of examples that seemed to consist of some other pieces that we did not have before: * hashicorp/terraform#5455 * stack72/terraform@e87d3bb#diff-41ae7af844f4aeb3ea48dabfcec0f176R443
I don't see it working. I have a preconfigured role that I would like to attach which is out of terrafrom and I am passing it as a variable to aws_db_instance resource. Its still failing with same error InvalidParameterCombination: A MonitoringRoleARN value is required if you specify a MonitoringInterval value other than 0 Using TF Version 0.11.3 |
I believe I can confirm @SandyFox's findings on TF 0.11.7. TF'ed a dedicated role for this function which attaches to the
|
For continued tracking of this issue, its probably best to continue the discussion in the open AWS provider issue here: hashicorp/terraform-provider-aws#315 I believe I tried reproducing it awhile ago and wasn't successful, but maybe the more recent folks here can provide samples of their configurations before and after so we can get this fixed up once and for all (or at least document why this behavior occurs). |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I am getting an weird issue with trying to enable RDS enhanced monitoring..
I do have the variable set and I've copied the implementation used in the test case here: stack72@e87d3bb
I wonder if it has something to do with expecting capital ARN in MonitoringRoleARN, but when I try various variables it fails as invalid.
My implementation:
Also, confirmed that the role and policy gets created with the right access. I manually turned on the enhanced monitoring and it worked using the role created by terraform.
@stack72 do you have any ideas?
The text was updated successfully, but these errors were encountered: