-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_netapp_volume - support NFSv4.1, vol sizing issue #5485
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR @paulomarquesc,
In addition to the comments i've left inline the docs will need to be updated to reflect the changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes @paulomarquesc,
i've address your comments inline
Co-Authored-By: kt <[email protected]>
Hi @katbyte , I completed the changes, please let me know if they're ok now or if I need to change anything else. |
@mbfrahry, awesome, I'll work on removing all the things that makes it non-breaking changes. |
Hey @paulomarquesc. Unfortunately, we still have to keep the breaking changes in until the next major release. For your ForceNew question, I saw we just have ForceNew there. Are there any options that you can swap it to other than NFSv3 or NFSv4.1? If so, we could write a |
Hi @mbfrahry, there is no migration path from one protocol to another, the volume needs to be recreated but we need to block the customer to inadvertently make this change and end up deleting production volumes, the only way I see is to remove About the breaking changes, ok, i'll keep those, |
@mbfrahry, I need you guys help here, I tried using the following code change to do a pre-validation but it looks like it does not work the way I was envisioned: if d.HasChange("protocols") {
return fmt.Errorf("`protocols` cannot be changed to a different protocol, a new volume needs to be created. `ProtocolTypesCanNotBeChanged`")
} When I added back the ForceNew = true, I ended up with my volume deleted and the error message came after it, so no use for this option. As I mentioned before to @katbyte, unless there is a clear solution you can help me with, where there is zero chance that the customer volume will be deleted before any sort of validation, we will need to leave the ForceNew option out and let Azure bubble up the error. This review process is already taking a long time and this is impacting one of the largest Azure customer that requires this change. I'm open for a joint session or any other solution that can speed up this PR. Please let me know how we can make this happen. |
for further information see https://www.terraform.io/docs/configuration/resources.html#prevent_destroy |
@katbyte, thanks, that is really helpful. I'll even add to the example and make a note in the documentation. I still have another question pending here: #5485 (comment) Can you please check? The issue is that
|
@paulomarquesc, that looks like it may have to do with the export policies being a type set.. it might go away if you use a type list? might not be possibleto do the deprecations with typeset =/ |
@katbyte, yes, I didn't have this issue when originally I made this as TypeList. |
@paulomarquesc, the protocols or the export policy? |
Also if you hope onto our community slack we can have a real time discussion there |
@katbyte, The issue is with Export policy. Protocols is working fine. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the revisions @paulomarquesc! this LGTM now 🚀
This has been released in version 2.1.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.1.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Hi Terraform team,
I'm part of Azure NetApp team at Microsoft and I'm providing this PR that adds support for NFSv4.1 since we have a partner that needs this support to work internally and with their own customers.
This is a summary of changes I made:
The acceptance tests are working fine as you can see the results below:
Please let me know if this PR looks good or if any changes are needed.
Regards
Paulo