-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exclusively use (Terraform) taints to manage GKE clusters in the error state #4780
Comments
Updated to exclusively. https://github.com/terraform-providers/terraform-provider-google/blob/master/google/resource_container_cluster.go#L1019 needs to be updated, https://github.com/terraform-providers/terraform-provider-google/blob/master/google/resource_container_cluster.go#L1057 is already using taints. |
Signed-off-by: Modular Magician <[email protected]>
Signed-off-by: Modular Magician <[email protected]>
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Affected Resource(s)
Today, if a GKE cluster enters an error state during
Create
we delete the cluster duringCreate
. With0.12
, it's possible to remove that behaviour. Errors duringCreate
cause the cluster to get tainted, causing Terraform to delete the cluster.As an additional extension, it may be possible to extend this behaviour to cover clusters in more error states.
Read
currently fails when a cluster is in an error state, so we may be able to taint the cluster in these cases.Note that some error states may be recoverable. In those cases, we shouldn't taint the cluster.
I don't believe tainting in Read possible currently, so an issue will need to be filed at https://github.com/hashicorp/terraform-plugin-sdk.
Added to
4.0.0
so this gets evaluated then, it's a significant behaviour change that could-be-but-probably-isn't compatible.b/299442706
The text was updated successfully, but these errors were encountered: