-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Subsequent plan/apply forces global cluster recreation when source cluster's storage_encrypted=true #15177
Comments
I had the same issue, needed to add a lifecycle to ignore changes on storage_encrypted as a work-around. |
I'm working on similar fixes for other attributes in the RDS resources, so picking this up as part of those efforts. |
…ted source_db_cluster_identifier without storage_encrypted Reference: #15177 Output from acceptance testing: ``` --- PASS: TestAccAWSRdsGlobalCluster_basic (25.00s) --- PASS: TestAccAWSRdsGlobalCluster_DatabaseName (35.93s) --- PASS: TestAccAWSRdsGlobalCluster_DeletionProtection (35.59s) --- PASS: TestAccAWSRdsGlobalCluster_disappears (19.24s) --- PASS: TestAccAWSRdsGlobalCluster_Engine_Aurora (25.19s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_Aurora (25.11s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_AuroraMySQL (25.27s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_AuroraPostgresql (23.12s) --- PASS: TestAccAWSRdsGlobalCluster_SourceDbClusterIdentifier (129.42s) --- PASS: TestAccAWSRdsGlobalCluster_SourceDbClusterIdentifier_StorageEncrypted (128.96s) --- PASS: TestAccAWSRdsGlobalCluster_StorageEncrypted (37.43s) ```
…ted source_db_cluster_identifier without storage_encrypted (#15916) Reference: #15177 Output from acceptance testing: ``` --- PASS: TestAccAWSRdsGlobalCluster_basic (25.00s) --- PASS: TestAccAWSRdsGlobalCluster_DatabaseName (35.93s) --- PASS: TestAccAWSRdsGlobalCluster_DeletionProtection (35.59s) --- PASS: TestAccAWSRdsGlobalCluster_disappears (19.24s) --- PASS: TestAccAWSRdsGlobalCluster_Engine_Aurora (25.19s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_Aurora (25.11s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_AuroraMySQL (25.27s) --- PASS: TestAccAWSRdsGlobalCluster_EngineVersion_AuroraPostgresql (23.12s) --- PASS: TestAccAWSRdsGlobalCluster_SourceDbClusterIdentifier (129.42s) --- PASS: TestAccAWSRdsGlobalCluster_SourceDbClusterIdentifier_StorageEncrypted (128.96s) --- PASS: TestAccAWSRdsGlobalCluster_StorageEncrypted (37.43s) ```
The fix for this has been merged and will release with version 3.13.0 of the Terraform AWS Provider, likely later today. 👍 |
This has been released in version 3.13.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform CLI and Terraform AWS Provider Version
Affected Resource(s)
Terraform Configuration Files
Debug Output
Panic Output
Expected Behavior
Subsequent plans should show no changes.
Actual Behavior
The subsequent plan shows a diff on the
storage_encrypted
attribute since now this attribute is marked as optional, it should be computed as well.Steps to Reproduce
terraform apply
terraform plan
Important Factoids
storage_encrypted should be Computed as well.
https://github.com/terraform-providers/terraform-provider-aws/blob/master/aws/resource_aws_rds_global_cluster.go#L99
The text was updated successfully, but these errors were encountered: