Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error: Provider produced inconsistent final plan when install Datadog from Helm provider 2.7.0 #979

Open
wadexu007 opened this issue Nov 1, 2022 · 5 comments

Comments

@wadexu007
Copy link

wadexu007 commented Nov 1, 2022

Terraform, Provider, Kubernetes and Helm Versions

Terraform version: 1.2.9
Provider version: 2.7.1 or 2.7.0
Kubernetes version: 1.22

Affected Resource(s)

  • helm_release

Terraform Configuration Files

terraform {
  required_version = ">= 1.2.9"

  backend "gcs" {
    bucket = "sre-dev-terraform"
    prefix = "state/datadog"
  }

  required_providers {
    google = {
      source  = "hashicorp/google"
      version = "~> 4.0"
    }
    kubectl = {
      source  = "gavinbunney/kubectl"
      version = ">= 1.7.0"
    }
    helm = {
      source = "hashicorp/helm"
      version = ">= 2.7.0"
    }
  }
}

data "google_project" "this" {
  project_id = local.project_id
}

data "google_client_config" "this" {}

data "google_container_cluster" "this" {
  name     = local.cluster_name
  location = local.cluster_region
  project  = data.google_project.this.project_id
}

provider "google" {
  project = local.project_id
  region  = local.cluster_region
}

provider "kubectl" {
  host                   = "https://${data.google_container_cluster.this.endpoint}"
  token                  = data.google_client_config.this.access_token
  cluster_ca_certificate = base64decode(data.google_container_cluster.this.master_auth[0].cluster_ca_certificate)
  load_config_file       = false
}

provider "helm" {
  kubernetes {
    host                   = "https://${data.google_container_cluster.this.endpoint}"
    token                  = data.google_client_config.this.access_token
    cluster_ca_certificate = base64decode(data.google_container_cluster.this.master_auth[0].cluster_ca_certificate)
  }

  experiments {
    manifest = true
  }
}
locals {
  project_id             = "xxx-sre-dev"
  cluster_name           = "xxx-gke"
  cluster_region         = "us-central1"

  datadogAttributes = {
    apiKey      = xxx
    appKey      = xxx
    clusterName = data.google_container_cluster.this.name
    projectName = data.google_container_cluster.this.project
  }
}

resource helm_release "datadog_agent" {
  name       = "datadog-agent"
  namespace  = local.datadog_ns
  repository = "https://helm.datadoghq.com"
  chart      = "datadog"
  version    = "3.1.11"

  values = [
    templatefile("yamls/datadog-agent-config.yaml.tftpl", local.datadogAttributes)
  ]
}

Debug Output

│ Error: Provider produced inconsistent final plan
│ 
│ When expanding the plan for helm_release.datadog_agent to include new values learned so far during apply, provider "registry.terraform.io/hashicorp/helm" produced an invalid new value for
│ .manifest: was ......

│ This is a bug in the provider, which should be reported in the provider's own issue tracker.

NOTE: In addition to Terraform debugging, please set HELM_DEBUG=1 to enable debugging info from helm.

Panic Output

Steps to Reproduce

  1. terraform apply

Expected Behavior

it is worked when Helm provider <=2.6.0

Actual Behavior

Failed to apply resource when Helm provider >= 2.7.0

Important Factoids

References

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment
@alexsomesan
Copy link
Member

Can you please share the full error message (without "..." redactions)? The one shared here isn't telling much.

@derbeneviv
Copy link

derbeneviv commented Jan 31, 2023

@alexsomesan
example of the same error with aws-load-balancer-controller
(disabling manifest = true solves the issue)

terraform {
  required_version = ">= 1.3.0"
  required_providers {
    aws = {
      source  = "aws"
      version = "~> 4.34.0"
    }
    helm = {
      source  = "helm"
      version = "~> 2.7.1"
    }
    kubernetes = {
      source  = "kubernetes"
      version = "~> 2.14.0"
    }
  }
}

provider "helm" {
  kubernetes {
    host                   = data.aws_eks_cluster.eks.endpoint
    cluster_ca_certificate = base64decode(data.aws_eks_cluster.eks.certificate_authority[0].data)
    token                  = data.aws_eks_cluster_auth.eks_cluster_auth.token
  }
  experiments {
    manifest = true
  }
}

resource "helm_release" "ingress_controller" {

  repository       = "https://aws.github.io/eks-charts"
  chart            = "aws-load-balancer-controller"
  version          = "1.4.7"
  name             = "aws-load-balancer-controller"
  namespace        = "kube-system"
  create_namespace = false
  verify           = false

  values = [
    templatefile("${path.module}/custom-values.yaml",
      {
        role_arn = aws_iam_role.aws-lb-controller.arn
        cluster_name = var.eks_cluster_id
    })
  ]
}

custom-values.yaml:

serviceAccount:
  annotations:
    eks.amazonaws.com/role-arn: ${role_arn}

clusterName: ${cluster_name}
ingressClassParams:
  create: false

ingressClassConfig:
  default: false

error:

│ When expanding the plan for
│ module.aws-load-balancer-controller[0].helm_release.ingress_controller to
│ include new values learned so far during apply, provider
│ "registry.terraform.io/hashicorp/helm" produced an invalid new value for
│ .manifest: was
│ cty.StringVal("{\"clusterrole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-role\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRole\",\"metadata\":{\"labels\":{\"app.kubernete"s.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controll"er-1.4.7\"},\"name\":\"aws-load-balancer-controller-role\"},\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\"resources\":[\"targetgroupbindings\"],\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"]},{\"apiGro"ups\":[\"elbv2.k8s.aws\"],\"resources\":[\"ingressclassparams\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"events\"],\"verbs\":[\"create\",\"patch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"pods\"],\"v"erbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingressclasses\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"\",\"extensions\",\"networking.k8s.io\"],\"resources\":[\"services\","\"ingresses\"],\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"nodes\",\"namespaces\",\"endpoints\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"elbv2.k8s.aws\",\"\",\"exte"nsions\",\"networking.k8s.io\"],\"resources\":[\"targetgroupbindings/status\",\"pods/status\",\"services/status\",\"ingresses/status\"],\"verbs\":[\"update\",\"patch\"]},{\"apiGroups\":[\"discovery.k8s.io\"],\"resources\":[\"endpointslice"s\"],\"verbs\":[\"get\",\"list\",\"watch\"]}]},\"clusterrolebinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-rolebinding\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleB"inding\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4."6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"aws-load-balancer-controller-"role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}]},\"kube-system/deployment.apps/apps/v1/aws-load-balancer-controller\":{\"apiVersion\":\"apps/v1\",\"kind\":\"Depl"oyment\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4."6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"},\"spec\":{\"replicas\":2,\"selector\":{\"matchLabels\":{\"app.kubernetes.io/instance\":\"aws-load-balan"cer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}},\"template\":{\"metadata\":{\"annotations\":{\"prometheus.io/port\":\"8080\",\"prometheus.io/scrape\":\"true\"},\"labels\":{\"app.kubernetes.io/instance\":\"aw"s-load-balancer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}},\"spec\":{\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchE"xpressions\":[{\"key\":\"app.kubernetes.io/name\",\"operator\":\"In\",\"values\":[\"aws-load-balancer-controller\"]}]},\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"containers\":[{\"args\":[\"--cluster-name=eks-test2\","\"--ingress-class=alb\"],\"command\":[\"/controller\"],\"image\":\"public.ecr.aws/eks/aws-load-balancer-controller:v2.4.6\",\"imagePullPolicy\":\"IfNotPresent\",\"livenessProbe\":{\"failureThreshold\":2,\"httpGet\":{\"path\":\"/healthz\","\"port\":61779,\"scheme\":\"HTTP\"},\"initialDelaySeconds\":30,\"timeoutSeconds\":10},\"name\":\"aws-load-balancer-controller\",\"ports\":[{\"containerPort\":9443,\"name\":\"webhook-server\",\"protocol\":\"TCP\"},{\"containerPort\":8080,\""name\":\"metrics-server\",\"protocol\":\"TCP\"}],\"resources\":{},\"securityContext\":{\"allowPrivilegeEscalation\":false,\"readOnlyRootFilesystem\":true,\"runAsNonRoot\":true},\"volumeMounts\":[{\"mountPath\":\"/tmp/k8s-webhook-server/s"erving-certs\",\"name\":\"cert\",\"readOnly\":true}]}],\"priorityClassName\":\"system-cluster-critical\",\"securityContext\":{\"fsGroup\":65534},\"serviceAccountName\":\"aws-load-balancer-controller\",\"terminationGracePeriodSeconds\":10,"\"volumes\":[{\"name\":\"cert\",\"secret\":{\"defaultMode\":420,\"secretName\":\"aws-load-balancer-tls\"}}]}}}},\"kube-system/role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-leader-election-role\":"{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"Role\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-b"alancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller-leader-election-role\",\"namespace\":\"kube-system\"},\"rules\":[{\"apiGroups\"":[\"\"],\"resources\":[\"configmaps\"],\"verbs\":[\"create\"]},{\"apiGroups\":[\"\"],\"resourceNames\":[\"aws-load-balancer-controller-leader\"],\"resources\":[\"configmaps\"],\"verbs\":[\"get\",\"patch\",\"update\"]}]},\"kube-system/rol"ebinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-leader-election-rolebinding\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"labels\":{\"app.kubernete"s.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controll"er-1.4.7\"},\"name\":\"aws-load-balancer-controller-leader-election-rolebinding\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"aws-load-balancer-controller-leader-elec"tion-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}]},\"kube-system/secret/v1/aws-load-balancer-tls\":{\"kind\":\"Secret\",\"apiVersion\":\"v1\",\"metadata\":{\""name\":\"aws-load-balancer-tls\",\"namespace\":\"kube-system\",\"creationTimestamp\":null,\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"a"ws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"}},\"data\":{\"ca.crt\":\"KHNlbnNpdGl2ZSB2YWx1ZSA1MjgyZmU3Yzc3YWY3NDRlKQ==\",\"tls.crt\":\"KHNlbnNpdGl2ZSB2YWx1"ZSA3NjQzM2JlODI5MjE3ODA2KQ==\",\"tls.key\":\"KHNlbnNpdGl2ZSB2YWx1ZSBkZjM1NzE4ZTkwZWVhOWJmKQ==\"},\"type\":\"kubernetes.io/tls\"},\"kube-system/service/v1/aws-load-balancer-webhook-service\":{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"me"tadata\":{\"labels\":{\"app.kubernetes.io/component\":\"webhook\",\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app."kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\",\"prometheus.io/service-monitor\":\"false\"},\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\"},\"spec\":{\"ports\":[{\""name\":\"webhook-server\",\"port\":443,\"targetPort\":\"webhook-server\"}],\"selector\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}}},\"kube-system/service"account/v1/aws-load-balancer-controller\":{\"apiVersion\":\"v1\",\"automountServiceAccountToken\":true,\"kind\":\"ServiceAccount\",\"metadata\":{\"annotations\":{\"eks.amazonaws.com/role-arn\":\"arn:aws:iam::071824717951:role/test2-aws-lb"-controller\"},\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"he"lm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}},\"list/v1/ingress-class\":{\"apiVersion\":\"v1\",\"items\":[{\"apiVersion\":\"networking.k8s.io/v1\",\"kind\":"\"IngressClass\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\"":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"alb\"},\"spec\":{\"controller\":\"ingress.k8s.aws/alb\"}}],\"kind\":\"List\",\"metadata\":{\"name\":\"ingress-class\"}},\"mutatingwebhookconfiguration.admiss"ionregistration.k8s.io/admissionregistration.k8s.io/v1/aws-load-balancer-webhook\":{\"apiVersion\":\"admissionregistration.k8s.io/v1\",\"kind\":\"MutatingWebhookConfiguration\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aw"s-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\"":\"aws-load-balancer-webhook\"},\"webhooks\":[{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQVBqcHZQYkh2TGZlNDNjZVk1OU9FSE13RFFZSktvWklodmNOQVFF"TEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXpFeE5EVTRNek5hRncwek16QXhNamd4TkRVNE16TmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3"FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUUN4cHRGTGU4dTVhU1JlQWo5NWc5S0c1Z1RiNmF3STNiSEc1bnR2Q1pqb1dLejFpSDVyazJBMQp2QlhxQzBxUHhoY3U3M05jUzJTaG5RS1RuT0RnTVBGTGRiZ29WMS9NeUwyM3h4RWNQaFl3QWhLZlpIYXVpYW9KCmdEN2JHaGlVcjFBZDJLbDFhMk9BZmhSR2lO"dXhNbWtjYTJVNjZqNW4vN3BIR3N5Qjh5dlhLNDM0cHg0dHlCRXkKYVdSbU5hSnlRdC9yTEhWWXA2QXRSSDlYV2xEY0VtdHRFQk5XTVZUV1FwdjVwWXNwbWhPeG5JcTVaQ204Tkw3YQp0aWEvUHlMYXdBQmxWV3VQVEY3RXJsZ0FiU1BPbHJFY3l5UzB2MWpSNFJ5ek0zc1ZrZEVQendTTUdBWnp2dnFRCk9EaE5BU1BXWm"51Ym14NFRxZFNESzlWeldLWWJiOGZ0QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVeWlhUE9pK1VVaEhyV2loVnYzd2QyRk5CNVhNd0RRWUpLb1pJaHZjTkFR"RUxCUUFECmdnRUJBS0UrcEFzZ01zNUdRNzBaTVlrTUpYNVNIT21YSytiaFltOXhlVVM5TWRxaFV5aFIrSlRFclJ1cmFoWmMKYUR0OW9JMHZoaXlPZU9JNVRlWnNsZXJPN1FJS3JPL2xsd3YrV1pJbno4NjF2d091a293eEZQUGR1NUlFVDhYcwphYjJCajZjNFV6cFJyRE5DWFhOZ0VMaVB1SDVtSDF2YThSTHZnZ25ZV3"RueHY5bkMreE42U0syYi9nUGFCb1RCCkZlK29helBNc0FVTDhncVNCWWZrQUVFY3NjcDlGdnJtOHhka25WS1ZKTXNKcTVydlkvWFlBZjVvVkErelp5cU4KNGNBUC9VTmVWQWFSQTg0T2J4R3Z4L1E1RTRiRnZEd1JjTmhlOFY1dkdhcENNMXRFYk12My9Ka3VPOW1LTnA2VQprMHhOdFBPM01wTFF6MFFLdU56b00yalJM"MGc9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/mutate-v1-pod\"}},\"failurePolicy\":\"Fail\",\"name\":\"mpod.elbv2.k8s.aws\",\"namespaceSelec"tor\":{\"matchExpressions\":[{\"key\":\"elbv2.k8s.aws/pod-readiness-gate-inject\",\"operator\":\"In\",\"values\":[\"enabled\"]}]},\"objectSelector\":{\"matchExpressions\":[{\"key\":\"app.kubernetes.io/name\",\"operator\":\"NotIn\",\"value"s\":[\"aws-load-balancer-controller\"]}]},\"rules\":[{\"apiGroups\":[\"\"],\"apiVersions\":[\"v1\"],\"operations\":[\"CREATE\"],\"resources\":[\"pods\"]}],\"sideEffects\":\"None\"},{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig"\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQVBqcHZQYkh2TGZlNDNjZVk1OU9FSE13RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXp"FeE5EVTRNek5hRncwek16QXhNamd4TkRVNE16TmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUUN4cHRGTGU4dTVhU1JlQWo5NWc5S0c1Z1RiNmF3STNiSEc1bnR2Q1pqb1dLe"jFpSDVyazJBMQp2QlhxQzBxUHhoY3U3M05jUzJTaG5RS1RuT0RnTVBGTGRiZ29WMS9NeUwyM3h4RWNQaFl3QWhLZlpIYXVpYW9KCmdEN2JHaGlVcjFBZDJLbDFhMk9BZmhSR2lOdXhNbWtjYTJVNjZqNW4vN3BIR3N5Qjh5dlhLNDM0cHg0dHlCRXkKYVdSbU5hSnlRdC9yTEhWWXA2QXRSSDlYV2xEY0VtdHRFQk5XTVZ"UV1FwdjVwWXNwbWhPeG5JcTVaQ204Tkw3YQp0aWEvUHlMYXdBQmxWV3VQVEY3RXJsZ0FiU1BPbHJFY3l5UzB2MWpSNFJ5ek0zc1ZrZEVQendTTUdBWnp2dnFRCk9EaE5BU1BXWm51Ym14NFRxZFNESzlWeldLWWJiOGZ0QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ"0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVeWlhUE9pK1VVaEhyV2loVnYzd2QyRk5CNVhNd0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBS0UrcEFzZ01zNUdRNzBaTVlrTUpYNVNIT21YSytiaFltOXhlVVM5TWRxaFV5aFIrSlRFclJ1cmFoWmMKYUR0OW9"JMHZoaXlPZU9JNVRlWnNsZXJPN1FJS3JPL2xsd3YrV1pJbno4NjF2d091a293eEZQUGR1NUlFVDhYcwphYjJCajZjNFV6cFJyRE5DWFhOZ0VMaVB1SDVtSDF2YThSTHZnZ25ZV3RueHY5bkMreE42U0syYi9nUGFCb1RCCkZlK29helBNc0FVTDhncVNCWWZrQUVFY3NjcDlGdnJtOHhka25WS1ZKTXNKcTVydlkvWFlBZ"jVvVkErelp5cU4KNGNBUC9VTmVWQWFSQTg0T2J4R3Z4L1E1RTRiRnZEd1JjTmhlOFY1dkdhcENNMXRFYk12My9Ka3VPOW1LTnA2VQprMHhOdFBPM01wTFF6MFFLdU56b00yalJMMGc9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\","\"namespace\":\"kube-system\",\"path\":\"/mutate-elbv2-k8s-aws-v1beta1-targetgroupbinding\"}},\"failurePolicy\":\"Fail\",\"name\":\"mtargetgroupbinding.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\"apiVersions\":[\"v1bet"a1\"],\"operations\":[\"CREATE\",\"UPDATE\"],\"resources\":[\"targetgroupbindings\"]}],\"sideEffects\":\"None\"}]},\"validatingwebhookconfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1/aws-load-balancer-webhook\":{"\"apiVersion\":\"admissionregistration.k8s.io/v1\",\"kind\":\"ValidatingWebhookConfiguration\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kuber"netes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-webhook\"},\"webhooks\":[{\"admissionReviewVersions\":[\"v1be"ta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQVBqcHZQYkh2TGZlNDNjZVk1OU9FSE13RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMW"pZVEFlRncweQpNekF4TXpFeE5EVTRNek5hRncwek16QXhNamd4TkRVNE16TmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUUN4cHRGTGU4dTVhU1JlQWo5NWc5S0c1Z1RiNmF3"STNiSEc1bnR2Q1pqb1dLejFpSDVyazJBMQp2QlhxQzBxUHhoY3U3M05jUzJTaG5RS1RuT0RnTVBGTGRiZ29WMS9NeUwyM3h4RWNQaFl3QWhLZlpIYXVpYW9KCmdEN2JHaGlVcjFBZDJLbDFhMk9BZmhSR2lOdXhNbWtjYTJVNjZqNW4vN3BIR3N5Qjh5dlhLNDM0cHg0dHlCRXkKYVdSbU5hSnlRdC9yTEhWWXA2QXRSSD"lYV2xEY0VtdHRFQk5XTVZUV1FwdjVwWXNwbWhPeG5JcTVaQ204Tkw3YQp0aWEvUHlMYXdBQmxWV3VQVEY3RXJsZ0FiU1BPbHJFY3l5UzB2MWpSNFJ5ek0zc1ZrZEVQendTTUdBWnp2dnFRCk9EaE5BU1BXWm51Ym14NFRxZFNESzlWeldLWWJiOGZ0QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJn"TlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVeWlhUE9pK1VVaEhyV2loVnYzd2QyRk5CNVhNd0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBS0UrcEFzZ01zNUdRNzBaTVlrTUpYNVNIT21YSytiaFltOXhlVVM5TWRxaFV5aFIrSl"RFclJ1cmFoWmMKYUR0OW9JMHZoaXlPZU9JNVRlWnNsZXJPN1FJS3JPL2xsd3YrV1pJbno4NjF2d091a293eEZQUGR1NUlFVDhYcwphYjJCajZjNFV6cFJyRE5DWFhOZ0VMaVB1SDVtSDF2YThSTHZnZ25ZV3RueHY5bkMreE42U0syYi9nUGFCb1RCCkZlK29helBNc0FVTDhncVNCWWZrQUVFY3NjcDlGdnJtOHhka25W"S1ZKTXNKcTVydlkvWFlBZjVvVkErelp5cU4KNGNBUC9VTmVWQWFSQTg0T2J4R3Z4L1E1RTRiRnZEd1JjTmhlOFY1dkdhcENNMXRFYk12My9Ka3VPOW1LTnA2VQprMHhOdFBPM01wTFF6MFFLdU56b00yalJMMGc9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balanc"er-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/validate-elbv2-k8s-aws-v1beta1-targetgroupbinding\"}},\"failurePolicy\":\"Fail\",\"name\":\"vtargetgroupbinding.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\""apiVersions\":[\"v1beta1\"],\"operations\":[\"CREATE\",\"UPDATE\"],\"resources\":[\"targetgroupbindings\"]}],\"sideEffects\":\"None\"},{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0"FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQVBqcHZQYkh2TGZlNDNjZVk1OU9FSE13RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXpFeE5EVTRNek5hRncwek16QXhNamd4TkRVNE16TmFNQ294"S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUUN4cHRGTGU4dTVhU1JlQWo5NWc5S0c1Z1RiNmF3STNiSEc1bnR2Q1pqb1dLejFpSDVyazJBMQp2QlhxQzBxUHhoY3U3M05jUzJTaG5RS1"RuT0RnTVBGTGRiZ29WMS9NeUwyM3h4RWNQaFl3QWhLZlpIYXVpYW9KCmdEN2JHaGlVcjFBZDJLbDFhMk9BZmhSR2lOdXhNbWtjYTJVNjZqNW4vN3BIR3N5Qjh5dlhLNDM0cHg0dHlCRXkKYVdSbU5hSnlRdC9yTEhWWXA2QXRSSDlYV2xEY0VtdHRFQk5XTVZUV1FwdjVwWXNwbWhPeG5JcTVaQ204Tkw3YQp0aWEvUHlM"YXdBQmxWV3VQVEY3RXJsZ0FiU1BPbHJFY3l5UzB2MWpSNFJ5ek0zc1ZrZEVQendTTUdBWnp2dnFRCk9EaE5BU1BXWm51Ym14NFRxZFNESzlWeldLWWJiOGZ0QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC"9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVeWlhUE9pK1VVaEhyV2loVnYzd2QyRk5CNVhNd0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBS0UrcEFzZ01zNUdRNzBaTVlrTUpYNVNIT21YSytiaFltOXhlVVM5TWRxaFV5aFIrSlRFclJ1cmFoWmMKYUR0OW9JMHZoaXlPZU9JNVRlWnNsZXJPN1FJS3JPL2xsd3YrV1pJ"bno4NjF2d091a293eEZQUGR1NUlFVDhYcwphYjJCajZjNFV6cFJyRE5DWFhOZ0VMaVB1SDVtSDF2YThSTHZnZ25ZV3RueHY5bkMreE42U0syYi9nUGFCb1RCCkZlK29helBNc0FVTDhncVNCWWZrQUVFY3NjcDlGdnJtOHhka25WS1ZKTXNKcTVydlkvWFlBZjVvVkErelp5cU4KNGNBUC9VTmVWQWFSQTg0T2J4R3Z4L1"E1RTRiRnZEd1JjTmhlOFY1dkdhcENNMXRFYk12My9Ka3VPOW1LTnA2VQprMHhOdFBPM01wTFF6MFFLdU56b00yalJMMGc9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/val"idate-networking-v1-ingress\"}},\"failurePolicy\":\"Fail\",\"matchPolicy\":\"Equivalent\",\"name\":\"vingress.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"networking.k8s.io\"],\"apiVersions\":[\"v1\"],\"operations\":[\"CREATE\",\"UPDATE\""],\"resources\":[\"ingresses\"]}],\"sideEffects\":\"None\"}]}}"),"
│ but now
│ cty.StringVal("{\"clusterrole.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-role\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRole\",\"metadata\":{\"labels\":{\"app.kubernete"s.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controll"er-1.4.7\"},\"name\":\"aws-load-balancer-controller-role\"},\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\"resources\":[\"targetgroupbindings\"],\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"]},{\"apiGro"ups\":[\"elbv2.k8s.aws\"],\"resources\":[\"ingressclassparams\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"events\"],\"verbs\":[\"create\",\"patch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"pods\"],\"v"erbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingressclasses\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"\",\"extensions\",\"networking.k8s.io\"],\"resources\":[\"services\","\"ingresses\"],\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"]},{\"apiGroups\":[\"\"],\"resources\":[\"nodes\",\"namespaces\",\"endpoints\"],\"verbs\":[\"get\",\"list\",\"watch\"]},{\"apiGroups\":[\"elbv2.k8s.aws\",\"\",\"exte"nsions\",\"networking.k8s.io\"],\"resources\":[\"targetgroupbindings/status\",\"pods/status\",\"services/status\",\"ingresses/status\"],\"verbs\":[\"update\",\"patch\"]},{\"apiGroups\":[\"discovery.k8s.io\"],\"resources\":[\"endpointslice"s\"],\"verbs\":[\"get\",\"list\",\"watch\"]}]},\"clusterrolebinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-rolebinding\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleB"inding\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4."6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"aws-load-balancer-controller-"role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}]},\"kube-system/deployment.apps/apps/v1/aws-load-balancer-controller\":{\"apiVersion\":\"apps/v1\",\"kind\":\"Depl"oyment\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4."6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"},\"spec\":{\"replicas\":2,\"selector\":{\"matchLabels\":{\"app.kubernetes.io/instance\":\"aws-load-balan"cer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}},\"template\":{\"metadata\":{\"annotations\":{\"prometheus.io/port\":\"8080\",\"prometheus.io/scrape\":\"true\"},\"labels\":{\"app.kubernetes.io/instance\":\"aw"s-load-balancer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}},\"spec\":{\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchE"xpressions\":[{\"key\":\"app.kubernetes.io/name\",\"operator\":\"In\",\"values\":[\"aws-load-balancer-controller\"]}]},\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"containers\":[{\"args\":[\"--cluster-name=eks-test2\","\"--ingress-class=alb\"],\"command\":[\"/controller\"],\"image\":\"public.ecr.aws/eks/aws-load-balancer-controller:v2.4.6\",\"imagePullPolicy\":\"IfNotPresent\",\"livenessProbe\":{\"failureThreshold\":2,\"httpGet\":{\"path\":\"/healthz\","\"port\":61779,\"scheme\":\"HTTP\"},\"initialDelaySeconds\":30,\"timeoutSeconds\":10},\"name\":\"aws-load-balancer-controller\",\"ports\":[{\"containerPort\":9443,\"name\":\"webhook-server\",\"protocol\":\"TCP\"},{\"containerPort\":8080,\""name\":\"metrics-server\",\"protocol\":\"TCP\"}],\"resources\":{},\"securityContext\":{\"allowPrivilegeEscalation\":false,\"readOnlyRootFilesystem\":true,\"runAsNonRoot\":true},\"volumeMounts\":[{\"mountPath\":\"/tmp/k8s-webhook-server/s"erving-certs\",\"name\":\"cert\",\"readOnly\":true}]}],\"priorityClassName\":\"system-cluster-critical\",\"securityContext\":{\"fsGroup\":65534},\"serviceAccountName\":\"aws-load-balancer-controller\",\"terminationGracePeriodSeconds\":10,"\"volumes\":[{\"name\":\"cert\",\"secret\":{\"defaultMode\":420,\"secretName\":\"aws-load-balancer-tls\"}}]}}}},\"kube-system/role.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-leader-election-role\":"{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"Role\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-b"alancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller-leader-election-role\",\"namespace\":\"kube-system\"},\"rules\":[{\"apiGroups\"":[\"\"],\"resources\":[\"configmaps\"],\"verbs\":[\"create\"]},{\"apiGroups\":[\"\"],\"resourceNames\":[\"aws-load-balancer-controller-leader\"],\"resources\":[\"configmaps\"],\"verbs\":[\"get\",\"patch\",\"update\"]}]},\"kube-system/rol"ebinding.rbac.authorization.k8s.io/rbac.authorization.k8s.io/v1/aws-load-balancer-controller-leader-election-rolebinding\":{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"labels\":{\"app.kubernete"s.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controll"er-1.4.7\"},\"name\":\"aws-load-balancer-controller-leader-election-rolebinding\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"aws-load-balancer-controller-leader-elec"tion-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}]},\"kube-system/secret/v1/aws-load-balancer-tls\":{\"kind\":\"Secret\",\"apiVersion\":\"v1\",\"metadata\":{\""name\":\"aws-load-balancer-tls\",\"namespace\":\"kube-system\",\"creationTimestamp\":null,\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"a"ws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"}},\"data\":{\"ca.crt\":\"KHNlbnNpdGl2ZSB2YWx1ZSAzNjZjMGJlYjEwNzg2ZjQ0KQ==\",\"tls.crt\":\"KHNlbnNpdGl2ZSB2YWx1"ZSAzZmIyYjI2NmJmMjIxYmE3KQ==\",\"tls.key\":\"KHNlbnNpdGl2ZSB2YWx1ZSA0MjBhMmMzZjZjZTg1MmYyKQ==\"},\"type\":\"kubernetes.io/tls\"},\"kube-system/service/v1/aws-load-balancer-webhook-service\":{\"apiVersion\":\"v1\",\"kind\":\"Service\",\"me"tadata\":{\"labels\":{\"app.kubernetes.io/component\":\"webhook\",\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app."kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\",\"prometheus.io/service-monitor\":\"false\"},\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\"},\"spec\":{\"ports\":[{\""name\":\"webhook-server\",\"port\":443,\"targetPort\":\"webhook-server\"}],\"selector\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\"}}},\"kube-system/service"account/v1/aws-load-balancer-controller\":{\"apiVersion\":\"v1\",\"automountServiceAccountToken\":true,\"kind\":\"ServiceAccount\",\"metadata\":{\"annotations\":{\"eks.amazonaws.com/role-arn\":\"arn:aws:iam::071824717951:role/test2-aws-lb"-controller\"},\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"he"lm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-controller\",\"namespace\":\"kube-system\"}},\"list/v1/ingress-class\":{\"apiVersion\":\"v1\",\"items\":[{\"apiVersion\":\"networking.k8s.io/v1\",\"kind\":"\"IngressClass\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\"":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"alb\"},\"spec\":{\"controller\":\"ingress.k8s.aws/alb\"}}],\"kind\":\"List\",\"metadata\":{\"name\":\"ingress-class\"}},\"mutatingwebhookconfiguration.admiss"ionregistration.k8s.io/admissionregistration.k8s.io/v1/aws-load-balancer-webhook\":{\"apiVersion\":\"admissionregistration.k8s.io/v1\",\"kind\":\"MutatingWebhookConfiguration\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aw"s-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\"":\"aws-load-balancer-webhook\"},\"webhooks\":[{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQUxxTjEzQ1UwNkhWamxHNDFyMFZkeHN3RFFZSktvWklodmNOQVFF"TEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXpFeE5EVTVNelZhRncwek16QXhNamd4TkRVNU16VmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3"FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUURjenB3YnQ2aTZQOEZCeXp5dnp5YmFsZ3RxNVRPL29tRWhVMGlCeWE1dUMwL3RGcU1oVUdZZQpPYjVQWGdmS2gySW14RFhWazdXZGluZnBsWEJlTTdoVFh0UHZ1WnVtYnc1OW9Hdzg1amxTb040S1piRSsvT0x2CnZJUmRUaUc1eXA3ajFLVkU4VzRMSnhOR1dC"ZERrMmtKcjAzbFFPSXc3V1BwR1Z0SVVqV01SZzBQb1JlR0RlWWMKVFkvWTVNNU5HSzdOT1R0dTUwdExyZG5YV1BJZnhHM0h4ZkR4a3gvWmpjeld0VnZKYnAySWhNenpSUStCd2ppTApUVUNSc1lGWHRuVXpNS0liR0lxNzNpVXYxQkxNaHozbG91aDBVSUhKZmdiN0NEVEhMVW81TG1lM1hSaDNTb3lWCit6M0p1dEZ6R2"hJT2UycThFZ3NrdlF1NUI1UEN4RE41QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVZC8ydHBTc3lRREZTdVk3REJMWEFZS1ZnQmE0d0RRWUpLb1pJaHZjTkFR"RUxCUUFECmdnRUJBSUJ1MUQrdGNLTDFoNkU5ZjJiTG1CdkpybnlNSXZqTEZORGIwREszTXhFdlZYVTkzOURNWjBRbHVJQ1gKU2dhVlFWZGU4empuemtGeW9YYUFDS2hoNks3TkxmNlNQRmx5VkRkdysvRG9ZaHFkYjJGZkVoY0RpSG96VXgrZApMUmxsVTl3L2hlZWRxQ2tPTElUNStCOXFFS3BCejNTdFRic3IrNWE5cl"crMFc0cU8zYUM0cW9ldWQzK3l5VkNwClpKRkd2bnI3T1pjZzZEcWxXK0F4M0U5dklxa1g0TkplUG5WQmdIRGFLUGI1THNPMkVreGRvK3B0SFM0aEVld3oKVkZuSHQwUjVMZXNnb2J6dmd0dGhKUjU5U3oySUVuWFNkcFNSMVZtc3FKbzJlMVo4WWQ5UGExeW9zRTg5Y3RSawo3cG55MHJDWlN1c1ltNWRjMERGZmxKSUhu"cW89Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/mutate-v1-pod\"}},\"failurePolicy\":\"Fail\",\"name\":\"mpod.elbv2.k8s.aws\",\"namespaceSelec"tor\":{\"matchExpressions\":[{\"key\":\"elbv2.k8s.aws/pod-readiness-gate-inject\",\"operator\":\"In\",\"values\":[\"enabled\"]}]},\"objectSelector\":{\"matchExpressions\":[{\"key\":\"app.kubernetes.io/name\",\"operator\":\"NotIn\",\"value"s\":[\"aws-load-balancer-controller\"]}]},\"rules\":[{\"apiGroups\":[\"\"],\"apiVersions\":[\"v1\"],\"operations\":[\"CREATE\"],\"resources\":[\"pods\"]}],\"sideEffects\":\"None\"},{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig"\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQUxxTjEzQ1UwNkhWamxHNDFyMFZkeHN3RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXp"FeE5EVTVNelZhRncwek16QXhNamd4TkRVNU16VmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUURjenB3YnQ2aTZQOEZCeXp5dnp5YmFsZ3RxNVRPL29tRWhVMGlCeWE1dUMwL"3RGcU1oVUdZZQpPYjVQWGdmS2gySW14RFhWazdXZGluZnBsWEJlTTdoVFh0UHZ1WnVtYnc1OW9Hdzg1amxTb040S1piRSsvT0x2CnZJUmRUaUc1eXA3ajFLVkU4VzRMSnhOR1dCZERrMmtKcjAzbFFPSXc3V1BwR1Z0SVVqV01SZzBQb1JlR0RlWWMKVFkvWTVNNU5HSzdOT1R0dTUwdExyZG5YV1BJZnhHM0h4ZkR4a3g"vWmpjeld0VnZKYnAySWhNenpSUStCd2ppTApUVUNSc1lGWHRuVXpNS0liR0lxNzNpVXYxQkxNaHozbG91aDBVSUhKZmdiN0NEVEhMVW81TG1lM1hSaDNTb3lWCit6M0p1dEZ6R2hJT2UycThFZ3NrdlF1NUI1UEN4RE41QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ"0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVZC8ydHBTc3lRREZTdVk3REJMWEFZS1ZnQmE0d0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBSUJ1MUQrdGNLTDFoNkU5ZjJiTG1CdkpybnlNSXZqTEZORGIwREszTXhFdlZYVTkzOURNWjBRbHVJQ1gKU2dhVlF"WZGU4empuemtGeW9YYUFDS2hoNks3TkxmNlNQRmx5VkRkdysvRG9ZaHFkYjJGZkVoY0RpSG96VXgrZApMUmxsVTl3L2hlZWRxQ2tPTElUNStCOXFFS3BCejNTdFRic3IrNWE5clcrMFc0cU8zYUM0cW9ldWQzK3l5VkNwClpKRkd2bnI3T1pjZzZEcWxXK0F4M0U5dklxa1g0TkplUG5WQmdIRGFLUGI1THNPMkVreGRvK"3B0SFM0aEVld3oKVkZuSHQwUjVMZXNnb2J6dmd0dGhKUjU5U3oySUVuWFNkcFNSMVZtc3FKbzJlMVo4WWQ5UGExeW9zRTg5Y3RSawo3cG55MHJDWlN1c1ltNWRjMERGZmxKSUhucW89Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\","\"namespace\":\"kube-system\",\"path\":\"/mutate-elbv2-k8s-aws-v1beta1-targetgroupbinding\"}},\"failurePolicy\":\"Fail\",\"name\":\"mtargetgroupbinding.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\"apiVersions\":[\"v1bet"a1\"],\"operations\":[\"CREATE\",\"UPDATE\"],\"resources\":[\"targetgroupbindings\"]}],\"sideEffects\":\"None\"}]},\"validatingwebhookconfiguration.admissionregistration.k8s.io/admissionregistration.k8s.io/v1/aws-load-balancer-webhook\":{"\"apiVersion\":\"admissionregistration.k8s.io/v1\",\"kind\":\"ValidatingWebhookConfiguration\",\"metadata\":{\"labels\":{\"app.kubernetes.io/instance\":\"aws-load-balancer-controller\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kuber"netes.io/name\":\"aws-load-balancer-controller\",\"app.kubernetes.io/version\":\"v2.4.6\",\"helm.sh/chart\":\"aws-load-balancer-controller-1.4.7\"},\"name\":\"aws-load-balancer-webhook\"},\"webhooks\":[{\"admissionReviewVersions\":[\"v1be"ta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQUxxTjEzQ1UwNkhWamxHNDFyMFZkeHN3RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMW"pZVEFlRncweQpNekF4TXpFeE5EVTVNelZhRncwek16QXhNamd4TkRVNU16VmFNQ294S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUURjenB3YnQ2aTZQOEZCeXp5dnp5YmFsZ3RxNVRP"L29tRWhVMGlCeWE1dUMwL3RGcU1oVUdZZQpPYjVQWGdmS2gySW14RFhWazdXZGluZnBsWEJlTTdoVFh0UHZ1WnVtYnc1OW9Hdzg1amxTb040S1piRSsvT0x2CnZJUmRUaUc1eXA3ajFLVkU4VzRMSnhOR1dCZERrMmtKcjAzbFFPSXc3V1BwR1Z0SVVqV01SZzBQb1JlR0RlWWMKVFkvWTVNNU5HSzdOT1R0dTUwdExyZG"5YV1BJZnhHM0h4ZkR4a3gvWmpjeld0VnZKYnAySWhNenpSUStCd2ppTApUVUNSc1lGWHRuVXpNS0liR0lxNzNpVXYxQkxNaHozbG91aDBVSUhKZmdiN0NEVEhMVW81TG1lM1hSaDNTb3lWCit6M0p1dEZ6R2hJT2UycThFZ3NrdlF1NUI1UEN4RE41QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJn"TlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVZC8ydHBTc3lRREZTdVk3REJMWEFZS1ZnQmE0d0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBSUJ1MUQrdGNLTDFoNkU5ZjJiTG1CdkpybnlNSXZqTEZORGIwREszTXhFdlZYVTkzOU"RNWjBRbHVJQ1gKU2dhVlFWZGU4empuemtGeW9YYUFDS2hoNks3TkxmNlNQRmx5VkRkdysvRG9ZaHFkYjJGZkVoY0RpSG96VXgrZApMUmxsVTl3L2hlZWRxQ2tPTElUNStCOXFFS3BCejNTdFRic3IrNWE5clcrMFc0cU8zYUM0cW9ldWQzK3l5VkNwClpKRkd2bnI3T1pjZzZEcWxXK0F4M0U5dklxa1g0TkplUG5WQmdI"RGFLUGI1THNPMkVreGRvK3B0SFM0aEVld3oKVkZuSHQwUjVMZXNnb2J6dmd0dGhKUjU5U3oySUVuWFNkcFNSMVZtc3FKbzJlMVo4WWQ5UGExeW9zRTg5Y3RSawo3cG55MHJDWlN1c1ltNWRjMERGZmxKSUhucW89Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balanc"er-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/validate-elbv2-k8s-aws-v1beta1-targetgroupbinding\"}},\"failurePolicy\":\"Fail\",\"name\":\"vtargetgroupbinding.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"elbv2.k8s.aws\"],\""apiVersions\":[\"v1beta1\"],\"operations\":[\"CREATE\",\"UPDATE\"],\"resources\":[\"targetgroupbindings\"]}],\"sideEffects\":\"None\"},{\"admissionReviewVersions\":[\"v1beta1\"],\"clientConfig\":{\"caBundle\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0"FURS0tLS0tCk1JSURRRENDQWlpZ0F3SUJBZ0lSQUxxTjEzQ1UwNkhWamxHNDFyMFZkeHN3RFFZSktvWklodmNOQVFFTEJRQXcKS2pFb01DWUdBMVVFQXhNZllYZHpMV3h2WVdRdFltRnNZVzVqWlhJdFkyOXVkSEp2Ykd4bGNpMWpZVEFlRncweQpNekF4TXpFeE5EVTVNelZhRncwek16QXhNamd4TkRVNU16VmFNQ294"S0RBbUJnTlZCQU1USDJGM2N5MXNiMkZrCkxXSmhiR0Z1WTJWeUxXTnZiblJ5YjJ4c1pYSXRZMkV3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXcKZ2dFS0FvSUJBUURjenB3YnQ2aTZQOEZCeXp5dnp5YmFsZ3RxNVRPL29tRWhVMGlCeWE1dUMwL3RGcU1oVUdZZQpPYjVQWGdmS2gySW14RFhWazdXZGluZn"BsWEJlTTdoVFh0UHZ1WnVtYnc1OW9Hdzg1amxTb040S1piRSsvT0x2CnZJUmRUaUc1eXA3ajFLVkU4VzRMSnhOR1dCZERrMmtKcjAzbFFPSXc3V1BwR1Z0SVVqV01SZzBQb1JlR0RlWWMKVFkvWTVNNU5HSzdOT1R0dTUwdExyZG5YV1BJZnhHM0h4ZkR4a3gvWmpjeld0VnZKYnAySWhNenpSUStCd2ppTApUVUNSc1lG"WHRuVXpNS0liR0lxNzNpVXYxQkxNaHozbG91aDBVSUhKZmdiN0NEVEhMVW81TG1lM1hSaDNTb3lWCit6M0p1dEZ6R2hJT2UycThFZ3NrdlF1NUI1UEN4RE41QWdNQkFBR2pZVEJmTUE0R0ExVWREd0VCL3dRRUF3SUMKcERBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEd1lEVlIwVEFRSC"9CQVV3QXdFQgovekFkQmdOVkhRNEVGZ1FVZC8ydHBTc3lRREZTdVk3REJMWEFZS1ZnQmE0d0RRWUpLb1pJaHZjTkFRRUxCUUFECmdnRUJBSUJ1MUQrdGNLTDFoNkU5ZjJiTG1CdkpybnlNSXZqTEZORGIwREszTXhFdlZYVTkzOURNWjBRbHVJQ1gKU2dhVlFWZGU4empuemtGeW9YYUFDS2hoNks3TkxmNlNQRmx5VkRk"dysvRG9ZaHFkYjJGZkVoY0RpSG96VXgrZApMUmxsVTl3L2hlZWRxQ2tPTElUNStCOXFFS3BCejNTdFRic3IrNWE5clcrMFc0cU8zYUM0cW9ldWQzK3l5VkNwClpKRkd2bnI3T1pjZzZEcWxXK0F4M0U5dklxa1g0TkplUG5WQmdIRGFLUGI1THNPMkVreGRvK3B0SFM0aEVld3oKVkZuSHQwUjVMZXNnb2J6dmd0dGhKUj"U5U3oySUVuWFNkcFNSMVZtc3FKbzJlMVo4WWQ5UGExeW9zRTg5Y3RSawo3cG55MHJDWlN1c1ltNWRjMERGZmxKSUhucW89Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\",\"service\":{\"name\":\"aws-load-balancer-webhook-service\",\"namespace\":\"kube-system\",\"path\":\"/val"idate-networking-v1-ingress\"}},\"failurePolicy\":\"Fail\",\"matchPolicy\":\"Equivalent\",\"name\":\"vingress.elbv2.k8s.aws\",\"rules\":[{\"apiGroups\":[\"networking.k8s.io\"],\"apiVersions\":[\"v1\"],\"operations\":[\"CREATE\",\"UPDATE\""],\"resources\":[\"ingresses\"]}],\"sideEffects\":\"None\"}]}}")."

Copy link

github-actions bot commented Feb 1, 2024

Marking this issue as stale due to inactivity. If this issue receives no comments in the next 30 days it will automatically be closed. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. This helps our maintainers find and focus on the active issues. Maintainers may also remove the stale label at their discretion. Thank you!

@github-actions github-actions bot added the stale label Feb 1, 2024
@jecnua
Copy link

jecnua commented Feb 22, 2024

Still valid. Please remove stale.
There are multiple issues opened for the same behaviour.
https://github.com/hashicorp/terraform-provider-helm/issues?q=is%3Aissue+is%3Aopen+Provider+produced+inconsistent+final+plan+

@github-actions github-actions bot removed the stale label Feb 22, 2024
@air3ijai
Copy link

air3ijai commented Mar 11, 2024

In the initially reported issue we have

  experiments {
    manifest = true
  }

As @derbeneviv already pointed out, disabling/removing that experimental option solve the issue for a lot of cases.

And more references

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants