-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cloud Provider Access Setup for Datalake #486
Comments
@deaddog we haven't, until recently, done a great deal of testing for data lakes and cloud provider access as we just finished up the PR to support data lakes (#414). @coderGo93 can you take a look at this and see if this is a possible issue we need to address before v1.0.0. |
@themantissa that's sound great. We'll postpone using the provider access resources for lakes until v1.0.0 is released. |
@deaddog 1.0.0 is now out with Data Lake support. Enjoy! |
Terraform CLI and Terraform MongoDB Atlas Provider Version
Terraform Configuration File
Steps to Reproduce
terraform apply
)terraform plan
Expected Behavior
Terraform should be generate a plan with no changes, as all changes have already been applied.
Actual Behavior
Planning fails with the following message:
We only see the error when the role is in use for a datalake. When we remove the role from all datalakes we can plan again.
The datalake is able to access to bucket by assuming the role, but terraform is rendered unusable.
Additional Context
We use the same set of resources for encryption at rest, and don't experience this issue. Unfortunately we can't (yet) create datalakes directly from terraform, but establishing the IAM role along with its policy and Atlas access would simplify the process of creating a lake as we can provision bucket, user/role for applications, role and provider access in a single apply.
The text was updated successfully, but these errors were encountered: