-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terrorm Plan Fails for v8.0.0 #675
Comments
Thank @ageekymonk for raising this issue. Do you have more output from Terraform ? The snippet you provide only tell us where is the so-called bug, but not what is the problem. |
@barryib Updated the comment to provide the full log |
Did you see this from the changelog ?
For more details #631 |
Thanks for response @barryib . I am creating a new cluster with security groups created separately. With this change I would not be able to create a cluster and assign the security group at the same time. I have to do a two step process. First create the security group by specifying target to just to create the security group then do cluster creation. It would be better if it could be done all at once. I reckon most people would like to create it with just terraform apply rather than two steps. |
This is quite annoying. But I think the apply should work. Maybe @ryanooi could help us with this. |
Sorry. will take a look |
Hi @ageekymonk I'm able to reproduce your issue. To understand more, why would you like to create the security group separately? |
Also facing a related issue. We use the same security group for multiple (identical) clusters. Having to create In addition, our worker security group uses inline ingress rules, which is incompatible with the resource rules. Hence, I would like the option to completely manage our SGs separately. |
I am facing the same issue. @ryanooi the reason I want to create the security group separately is that I want to allow access to the cluster api endpoint (which is private) from the IP address of the server where I'm running terraform. If the cluster isn't created with that access allowed then apply hangs forever because it uses the response from the api endpoint to determine whether the cluster has been created. |
I guess i made the wrong "assumption" and it's different with all people here. I also using the same worker node security group for all the cluster. The difference is I create the security group in another workspace with all the basic network stuffs (i called it network layer) and I refer it using remote state. Let me revert the diff and add back Boolean flag variable |
Sorry all. To not block you guys. I'll revert all my changes. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I have issues
When terraform plan is applied for v8.0.0 it fails with the following error.
I'm submitting a...
If this is a bug, how to reproduce? Please include a code sample if relevant.
What's the expected behavior?
terraform plan should succeed.
Are you able to fix this problem and submit a PR? Link here if you have already.
No
Environment details
Any other relevant info
The text was updated successfully, but these errors were encountered: