-
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
private_propagating_vgws #85
Comments
@jgrill I'm experiencing something similar, I think. Here's my currently working VPC using both the options you mentioned:
I have noticed I have multiple subnets and route tables, but only the default route table is affected.
|
@antonbabenko any thoughts here? It appears that somehow the interaction w/the default route table is affecting propagating routes. |
First, thanks for opening this one. VPN is more complicated than other types of issues and it is harder to debug (at least for me), so I need your help to triage this one. Looking into previous releases and trying to understand when things broke:
variable "propagate_default_route_tables_vgw" {
description = "Should be true if you want route table propagation"
default = false
}
resource "aws_vpn_gateway_route_propagation" "default" {
count = "${var.create_vpc && var.propagate_default_route_tables_vgw && (var.enable_vpn_gateway || var.vpn_gateway_id != "") ? 1 : 0}"
route_table_id = "${element(aws_default_route_table.this.*.id, count.index)}"
vpn_gateway_id = "${element(concat(aws_vpn_gateway.this.*.id, aws_vpn_gateway_attachment.this.*.vpn_gateway_id), count.index)}"
} Can you guys try it out on your setup and say if it works? |
Appreciate the quick response, I've got a dev environment that's available. Will give those versions a shot and report back. |
Using the following vpc definition, the result was no longer flip-flopping on route propagation but still not desired result. Public routes were propagating, private routes are not. Does this config look correct for this version?
There was still flip-flopping for subnet names and default names, but routes were deterministic, if incorrect.
Results for versions 1.22.0 and 1.20.0 were the same, 1.19.0 was fully idempotent with the removal of the default resources. |
Right, so let's look into how to improve version 1.23.0. I don't quite understand does it work well when you add the proposed piece of code into it? |
Sorry, I misunderstood a bit there. I didn't think to pull down the module and add the code. After doing so, and setting the
|
@ohaiwalt You can test it like this: module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "1.24.0-pre"
# the rest...
} |
@antonbabenko looks like that one did it! Only one change:
|
Yes, but tag name should be changed just once as far as I understand. When I run |
Closing this, if any one is still having issues with this in the the latest provider version please open a new issue |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I'm having trouble using the following with this module:
The problem I'm having is every other time I run Terraform the propagation is turned off and then on again.
I noticed private_propagating_vgws in the variables and main.tf of this module but am a bit puzzled as to how to use this parameter in combination with enable_vpn_gateway="true".
Can someone provide an example of the correct way to enable route propagation on the route tables associated with the VPC created by this module?
The text was updated successfully, but these errors were encountered: