-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug: azurerm_kubernetes_cluster errors out with InvalidLoadbalancerProfile on changes #6534
Bug: azurerm_kubernetes_cluster errors out with InvalidLoadbalancerProfile on changes #6534
Conversation
edd985c
to
aa37bd2
Compare
Before:
After test enhancement:
After code change:
|
This would really help us! Is there anything we can do to help the merge? |
Another one is looking forward for this PR to be merged. |
I used this to expose the kubelet identity before 2.6: data "azuread_service_principal" "node_identity" {
display_name = "${azurerm_kubernetes_cluster.my_cluster.name}-agentpool"
}
output "node_service_principal_id" {
value = data.azuread_service_principal.node_identity.id
} |
We are facing this issue. Is this PR planned to be merged any time soon? |
@tombuildsstuff Any idea on getting this in for a quick 2.8.0 or 2.7.1 ? It's a really sad issue. |
I have just successfully tested this PR. |
It's not part of the 2.9 release, is it? |
Nope. I'll rebase it to resolve the conflicts |
Will this PR be part of the 2.10 release? This is really blocking us from updating our clusters... |
I discussed it with the maintainers, if it doesn’t make it into 2.10.0 (May 14th) expect it for 2.11.0. |
Can we please have this in a patch release |
this needs to be picked up ASAP :) we will be reverting back to a custom local provider code, but we hate doing this... @aristosvo any feedback on your PR from @tombuildsstuff / @katbyte yet ? I quickly reviewed , and it seems good. |
@djsly this:
@katbyte has taken a look at the PR and told me she will discuss it internally with someone more familiar with AKS, probably @tombuildsstuff. One of the main reasons they are hesitant to merge AKS PRs at the moment is due to a lot of breaking API changes for AKS lately.. |
@aristosvo I understand, so many changes. but this not being merged is breaking the usage of terraform + aks |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this fix @aristosvo, LGTM 👍
This has been released in version 2.10.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.10.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Fixes #6525