Closed finkjordanj closed 5 months ago
Please try it with new version 2.0.1-alpha.
Assuming you meant 0.2.1-alpha.
Still getting errors when applying if the currently configured state in the dashboard doesn't match a previous applied terraform code. Appears to be need for error handling to reapply if group policy no longer exists in dashboard.
Scenario. All four group policies created. During maintenance a policy was removed in the dashboard. Terraform apply runs next during other change and during state refresh this failures occurs.
data.meraki_networks.dev_networks: Reading... data.meraki_networks.dev_networks: Read complete after 1s meraki_networks_syslog_servers.this_spoke: Refreshing state... meraki_networks_group_policies.group_policy_internal: Refreshing state... [name=INTERNAL] meraki_networks_group_policies.group_policy_byod: Refreshing state... [name=BYOD] meraki_networks_group_policies.group_policy_guest: Refreshing state... [name=GUEST] meraki_networks_group_policies.group_policy_pan: Refreshing state... [name=PAN] Planning failed. Terraform encountered an error while generating this plan. ╷ │ Error: Failure when executing GetNetworkGroupPolicy │ │ with meraki_networks_group_policies.group_policy_byod, │ on network.tf line 27, in resource "meraki_networks_group_policies" "group_policy_byod": │ 27: resource "meraki_networks_group_policies" "group_policy_byod" { │ │ error with operation GetNetworkGroupPolicy ╵ ╷ │ Error: Failure when executing GetNetworkGroupPolicy │ │ with meraki_networks_group_policies.group_policy_pan, │ on network.tf line 45, in resource "meraki_networks_group_policies" "group_policy_pan": │ 45: resource "meraki_networks_group_policies" "group_policy_pan" { │ │ error with operation GetNetworkGroupPolicy ╵ ::error::Terraform exited with code 1. Error: Process completed with exit code 1.
Also appear to be running into possibly an API rate limit issue when building and managing multiple group policies per apply. When i have 4 policies to build. I can get two to build at first and two will error out on operation CreateNetworkGroupPolicy.
Run terraform apply -auto-approve
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 1s
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# meraki_networks_appliance_firewall_firewalled_services.this_icmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_icmp" {
+ access = "unrestricted"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "ICMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_snmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_snmp" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "SNMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_web will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_web" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "web"
}
# meraki_networks_group_policies.group_policy_byod will be created
+ resource "meraki_networks_group_policies" "group_policy_byod" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = (known after apply)
+ name = "BYOD"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "20"
}
}
# meraki_networks_group_policies.group_policy_guest will be created
+ resource "meraki_networks_group_policies" "group_policy_guest" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = (known after apply)
+ name = "GUEST"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "30"
}
}
# meraki_networks_group_policies.group_policy_internal will be created
+ resource "meraki_networks_group_policies" "group_policy_internal" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = (known after apply)
+ name = "INTERNAL"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "5"
}
}
# meraki_networks_group_policies.group_policy_pan will be created
+ resource "meraki_networks_group_policies" "group_policy_pan" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = (known after apply)
+ name = "PAN"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "[15](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9213195638/job/25346509549#step:13:16)"
}
}
# meraki_networks_syslog_servers.this_spoke will be created
+ resource "meraki_networks_syslog_servers" "this_spoke" {
+ network_id = "L_783626335[16](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9213195638/job/25346509549#step:13:17)2467749"
+ servers = [
+ {
+ host = "162.131.235.[18](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9213195638/job/25346509549#step:13:19)3"
+ port = 443
+ roles = [
+ "Air Marshal events",
+ "Appliance event log",
+ "Security events",
+ "Switch event log",
]
},
]
}
Plan: 8 to add, 0 to change, 0 to destroy.
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_web: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Creating...
meraki_networks_group_policies.group_policy_guest: Creating...
meraki_networks_group_policies.group_policy_internal: Creating...
meraki_networks_syslog_servers.this_spoke: Creating...
meraki_networks_group_policies.group_policy_pan: Creating...
meraki_networks_group_policies.group_policy_byod: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Creation complete after 1s
meraki_networks_appliance_firewall_firewalled_services.this_web: Creation complete after 1s
meraki_networks_group_policies.group_policy_guest: Creation complete after 1s [name=GUEST]
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Creation complete after 2s
meraki_networks_syslog_servers.this_spoke: Creation complete after 2s
meraki_networks_group_policies.group_policy_byod: Creation complete after 2s [name=BYOD]
╷
│ Error: Failure when executing CreateNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_pan,
│ on network.tf line [48](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9213195638/job/25346509549#step:13:49), in resource "meraki_networks_group_policies" "group_policy_pan":
│ 48: resource "meraki_networks_group_policies" "group_policy_pan" {
│
│ error with operation CreateNetworkGroupPolicy
╵
╷
│ Error: Failure when executing CreateNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_internal,
│ on network.tf line 57, in resource "meraki_networks_group_policies" "group_policy_internal":
│ [57](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9213195638/job/25346509549#step:13:58): resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation CreateNetworkGroupPolicy
╵
Error: Terraform exited with code 1.
Error: Process completed with exit code 1.
If i run another apply I will be able build one or two of the remaining but may error out similar operation failure. This I believe is separate from the issue in the comment prior about the error handling.
Please use depends_on
, for example...
https://github.com/cisco-open/terraform-provider-meraki/blob/main/examples/samples/resources/testing/resource.tf
Please, try it a update us
Hello, The depends on resolves the issue when applying multiple on initial creation.
I am however still running into errors in the error handling if a policy is deleted in the dashboard and on next apply the apply fails out during the state refresh instead of determining it should add back the missing policy.
Acquiring state lock. This may take a few moments...
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 1s
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_web: Refreshing state...
meraki_networks_group_policies.group_policy_byod: Refreshing state... [name=BYOD]
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Refreshing state...
meraki_networks_syslog_servers.this_spoke: Refreshing state...
meraki_networks_group_policies.group_policy_guest: Refreshing state... [name=GUEST]
meraki_networks_group_policies.group_policy_pan: Refreshing state... [name=PAN]
Planning failed. Terraform encountered an error while generating this plan.
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_pan,
│ on network.tf line 54, in resource "meraki_networks_group_policies" "group_policy_pan":
│ 54: resource "meraki_networks_group_policies" "group_policy_pan" {
│
│ error with operation GetNetworkGroupPolicy
Oh, this is because API returns a 400 code to say "Not found", terraform code expects a 404 code, I´m going to include this exception in code and update you.
I was attempting to move the manual resources calls out of the individual project per site and into a self maintained module where we just flag them on or off with a ( count = if_true_statement ? 1 : 0 ). even after adding the dependencies when i try to do a plan or apply after the initial apply which was successful I get the following output error. While calling them from my module.
code within my module.
resource "meraki_networks_group_policies" "group_policy_byod" {
count = var.spoke == true ? 1 : 0
name = "BYOD"
group_policy_id = "20"
network_id = var.network_id
vlan_tagging = {
settings = "custom"
vlan_id = "20"
}
}
resource "meraki_networks_group_policies" "group_policy_guest" {
count = var.spoke == true ? 1 : 0
name = "GUEST"
group_policy_id = "30"
network_id = var.network_id
vlan_tagging = {
settings = "custom"
vlan_id = "30"
}
depends_on = [meraki_networks_group_policies.group_policy_byod]
}
resource "meraki_networks_group_policies" "group_policy_internal" {
count = var.spoke == true ? 1 : 0
name = "INTERNAL"
group_policy_id = "5"
network_id = var.network_id
vlan_tagging = {
settings = "custom"
vlan_id = "5"
}
depends_on = [meraki_networks_group_policies.group_policy_guest]
}
resource "meraki_networks_group_policies" "group_policy_pan" {
count = var.spoke == true ? 1 : 0
name = "PAN"
group_policy_id = "15"
network_id = var.network_id
vlan_tagging = {
settings = "custom"
vlan_id = "15"
}
depends_on = [meraki_networks_group_policies.group_policy_internal]
}
Error output.
terraform plan
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 0s
meraki_networks_appliance_vlans_settings.this_vlans: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_appliance_connectivity_monitoring_destinations.this: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_appliance_firewall_firewalled_services.this_snmp[0]: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_group_policies.group_policy_internal[0]: Refreshing state... [name=INTERNAL]
module.pfg-managed-meraki-baseline.meraki_networks_snmp.this: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_switch_settings.this_site_switch_settings[0]: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_1: Refreshing state... [id=1]
module.pfg-managed-meraki-baseline.meraki_networks_appliance_firewall_firewalled_services.this_icmp[0]: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_syslog_servers.this_spoke[0]: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_switch_mtu.this_site_switch_mtu[0]: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_appliance_firewall_settings.this: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_appliance_firewall_firewalled_services.this_web[0]: Refreshing state...
module.pfg-managed-meraki-baseline.meraki_networks_traffic_analysis.this_spoke[0]: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_30: Refreshing state... [id=30]
meraki_networks_appliance_vlans.this_vlan_[20](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9275765056/job/25521234240#step:13:21): Refreshing state... [id=20]
meraki_networks_appliance_vlans.this_vlan_10: Refreshing state... [id=10]
meraki_networks_appliance_vlans.this_vlan_2: Refreshing state... [id=2]
meraki_networks_appliance_vlans.this_vlan_5: Refreshing state... [id=5]
Planning failed. Terraform encountered an error while generating this plan.
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with module.pfg-managed-meraki-baseline.meraki_networks_group_policies.group_policy_internal[0],
│ on .terraform/modules/pfg-managed-meraki-baseline/group_policy.tf line 1, in resource "meraki_networks_group_policies" "group_policy_internal":
│ 1: resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation GetNetworkGroupPolicy
╵
::error::Terraform exited with code 1.
Error: Process completed with exit code 1.
After moving these resource out of the module and just back into the project folder for the site i am running into the getNetworkGroupPolicy action on state refresh.
Run terraform apply -auto-approve
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 0s
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Refreshing state...
meraki_networks_traffic_analysis.this_spoke: Refreshing state...
meraki_networks_appliance_firewall_settings.this: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Refreshing state...
meraki_networks_appliance_connectivity_monitoring_destinations.this: Refreshing state...
meraki_networks_appliance_vlans_settings.this_vlans: Refreshing state...
meraki_networks_snmp.this: Refreshing state...
meraki_networks_switch_mtu.this_site_switch_mtu[0]: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_1: Refreshing state... [id=1]
meraki_networks_group_policies.group_policy_internal: Refreshing state... [name=INTERNAL]
meraki_networks_syslog_servers.this_spoke: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_web: Refreshing state...
meraki_networks_switch_settings.this_site_switch_settings[0]: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_30: Refreshing state... [id=30]
meraki_networks_appliance_vlans.this_vlan_10: Refreshing state... [id=10]
meraki_networks_appliance_vlans.this_vlan_[20](https://github.com/principalinformationservices-emu/infra-meraki-network-test/actions/runs/9291695303/job/25570843163#step:13:21): Refreshing state... [id=20]
meraki_networks_appliance_vlans.this_vlan_2: Refreshing state... [id=2]
meraki_networks_appliance_vlans.this_vlan_5: Refreshing state... [id=5]
Planning failed. Terraform encountered an error while generating this plan.
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_internal,
│ on network.tf line 101, in resource "meraki_networks_group_policies" "group_policy_internal":
│ 101: resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation GetNetworkGroupPolicy
╵
::error::Terraform exited with code 1.
Error: Process completed with exit code 1.
Hi @finkjordanj please try it again with new version please.
After reinitializing to v0.2.2-alpha i still run into issue after the first apply on the state refresh/getNetworkGroupPolicy
The configuration block for the group policies
resource "meraki_networks_group_policies" "group_policy_internal" {
name = "INTERNAL"
group_policy_id = "5"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "5"
}
}
resource "meraki_networks_group_policies" "group_policy_pan" {
name = "PAN"
group_policy_id = "15"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "15"
}
depends_on = [meraki_networks_group_policies.group_policy_internal]
}
resource "meraki_networks_group_policies" "group_policy_byod" {
name = "BYOD"
group_policy_id = "20"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "20"
}
depends_on = [meraki_networks_group_policies.group_policy_pan]
}
resource "meraki_networks_group_policies" "group_policy_guest" {
name = "GUEST"
group_policy_id = "30"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "30"
}
depends_on = [meraki_networks_group_policies.group_policy_byod]
}
fink@LTWXCGVT333:~/dev/meraki-terraform-test $ terraform init
Initializing the backend...
Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.
Initializing provider plugins...
- Finding hashicorp/aws versions matching "5.22.0"...
- Finding cisco-open/meraki versions matching "0.2.2-alpha"...
- Installing hashicorp/aws v5.22.0...
- Installed hashicorp/aws v5.22.0 (signed by HashiCorp)
- Installing cisco-open/meraki v0.2.2-alpha...
- Installed cisco-open/meraki v0.2.2-alpha (signed by a HashiCorp partner, key ID 535815BB4B6133C1)
Partner and community providers are signed by their developers.
If you'd like to know more about provider signing, you can read about it here:
https://www.terraform.io/docs/cli/plugins/signing.html
Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
fink@LTWXCGVT333:~/dev/meraki-terraform-test $ terraform plan
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 2s
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# meraki_networks_appliance_connectivity_monitoring_destinations.this will be created
+ resource "meraki_networks_appliance_connectivity_monitoring_destinations" "this" {
+ destinations = [
+ {
+ default = true
+ description = "Google"
+ ip = "8.8.8.8"
},
]
+ network_id = "L_783626335162467749"
}
# meraki_networks_appliance_firewall_firewalled_services.this_icmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_icmp" {
+ access = "unrestricted"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "ICMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_snmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_snmp" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "SNMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_web will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_web" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "web"
}
# meraki_networks_appliance_firewall_settings.this will be created
+ resource "meraki_networks_appliance_firewall_settings" "this" {
+ network_id = "L_783626335162467749"
+ spoofing_protection = {
+ ip_source_guard = {
+ mode = "block"
}
}
}
# meraki_networks_group_policies.group_policy_byod will be created
+ resource "meraki_networks_group_policies" "group_policy_byod" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "20"
+ name = "BYOD"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "20"
}
}
# meraki_networks_group_policies.group_policy_guest will be created
+ resource "meraki_networks_group_policies" "group_policy_guest" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "30"
+ name = "GUEST"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "30"
}
}
# meraki_networks_group_policies.group_policy_internal will be created
+ resource "meraki_networks_group_policies" "group_policy_internal" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "5"
+ name = "INTERNAL"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "5"
}
}
# meraki_networks_group_policies.group_policy_pan will be created
+ resource "meraki_networks_group_policies" "group_policy_pan" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "15"
+ name = "PAN"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "15"
}
}
# meraki_networks_snmp.this will be created
+ resource "meraki_networks_snmp" "this" {
+ access = "users"
+ community_string = (known after apply)
+ network_id = "L_783626335162467749"
+ users = [
+ {
+ passphrase = "<-blanked->"
+ username = "MerakiV3user"
},
]
}
# meraki_networks_syslog_servers.this_spoke will be created
+ resource "meraki_networks_syslog_servers" "this_spoke" {
+ network_id = "L_783626335162467749"
+ servers = [
+ {
+ host = "162.131.235.183"
+ port = 443
+ roles = [
+ "Air Marshal events",
+ "Appliance event log",
+ "Security events",
+ "Switch event log",
]
},
]
}
# meraki_networks_traffic_analysis.this_spoke will be created
+ resource "meraki_networks_traffic_analysis" "this_spoke" {
+ custom_pie_chart_items = (known after apply)
+ mode = "detailed"
+ network_id = "L_783626335162467749"
}
Plan: 12 to add, 0 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now.
fink@LTWXCGVT333:~/dev/meraki-terraform-test $ terraform apply
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 0s
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# meraki_networks_appliance_connectivity_monitoring_destinations.this will be created
+ resource "meraki_networks_appliance_connectivity_monitoring_destinations" "this" {
+ destinations = [
+ {
+ default = true
+ description = "Google"
+ ip = "8.8.8.8"
},
]
+ network_id = "L_783626335162467749"
}
# meraki_networks_appliance_firewall_firewalled_services.this_icmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_icmp" {
+ access = "unrestricted"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "ICMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_snmp will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_snmp" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "SNMP"
}
# meraki_networks_appliance_firewall_firewalled_services.this_web will be created
+ resource "meraki_networks_appliance_firewall_firewalled_services" "this_web" {
+ access = "blocked"
+ allowed_ips = (known after apply)
+ network_id = "L_783626335162467749"
+ service = "web"
}
# meraki_networks_appliance_firewall_settings.this will be created
+ resource "meraki_networks_appliance_firewall_settings" "this" {
+ network_id = "L_783626335162467749"
+ spoofing_protection = {
+ ip_source_guard = {
+ mode = "block"
}
}
}
# meraki_networks_group_policies.group_policy_byod will be created
+ resource "meraki_networks_group_policies" "group_policy_byod" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "20"
+ name = "BYOD"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "20"
}
}
# meraki_networks_group_policies.group_policy_guest will be created
+ resource "meraki_networks_group_policies" "group_policy_guest" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "30"
+ name = "GUEST"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "30"
}
}
# meraki_networks_group_policies.group_policy_internal will be created
+ resource "meraki_networks_group_policies" "group_policy_internal" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "5"
+ name = "INTERNAL"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "5"
}
}
# meraki_networks_group_policies.group_policy_pan will be created
+ resource "meraki_networks_group_policies" "group_policy_pan" {
+ bandwidth = (known after apply)
+ bonjour_forwarding = (known after apply)
+ content_filtering = (known after apply)
+ firewall_and_traffic_shaping = (known after apply)
+ group_policy_id = "15"
+ name = "PAN"
+ network_id = "L_783626335162467749"
+ scheduling = (known after apply)
+ splash_auth_settings = (known after apply)
+ vlan_tagging = {
+ settings = "custom"
+ vlan_id = "15"
}
}
# meraki_networks_snmp.this will be created
+ resource "meraki_networks_snmp" "this" {
+ access = "users"
+ community_string = (known after apply)
+ network_id = "L_783626335162467749"
+ users = [
+ {
+ passphrase = "<-blanked->"
+ username = "MerakiV3user"
},
]
}
# meraki_networks_syslog_servers.this_spoke will be created
+ resource "meraki_networks_syslog_servers" "this_spoke" {
+ network_id = "L_783626335162467749"
+ servers = [
+ {
+ host = "162.131.235.183"
+ port = 443
+ roles = [
+ "Air Marshal events",
+ "Appliance event log",
+ "Security events",
+ "Switch event log",
]
},
]
}
# meraki_networks_traffic_analysis.this_spoke will be created
+ resource "meraki_networks_traffic_analysis" "this_spoke" {
+ custom_pie_chart_items = (known after apply)
+ mode = "detailed"
+ network_id = "L_783626335162467749"
}
Plan: 12 to add, 0 to change, 0 to destroy.
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
meraki_networks_appliance_firewall_settings.this: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_web: Creating...
meraki_networks_traffic_analysis.this_spoke: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Creating...
meraki_networks_appliance_connectivity_monitoring_destinations.this: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Creating...
meraki_networks_snmp.this: Creating...
meraki_networks_syslog_servers.this_spoke: Creating...
meraki_networks_group_policies.group_policy_internal: Creating...
meraki_networks_appliance_firewall_firewalled_services.this_web: Creation complete after 3s
meraki_networks_traffic_analysis.this_spoke: Creation complete after 3s
meraki_networks_appliance_firewall_settings.this: Creation complete after 4s
meraki_networks_snmp.this: Creation complete after 4s
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Creation complete after 4s
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Creation complete after 4s
meraki_networks_appliance_connectivity_monitoring_destinations.this: Creation complete after 4s
meraki_networks_syslog_servers.this_spoke: Creation complete after 5s
meraki_networks_group_policies.group_policy_internal: Creation complete after 5s [name=INTERNAL]
meraki_networks_group_policies.group_policy_pan: Creating...
meraki_networks_group_policies.group_policy_pan: Creation complete after 1s [name=PAN]
meraki_networks_group_policies.group_policy_byod: Creating...
meraki_networks_group_policies.group_policy_byod: Creation complete after 1s [name=BYOD]
meraki_networks_group_policies.group_policy_guest: Creating...
meraki_networks_group_policies.group_policy_guest: Creation complete after 2s [name=GUEST]
Apply complete! Resources: 12 added, 0 changed, 0 destroyed.
fink@LTWXCGVT333:~/dev/meraki-terraform-test $ terraform plan
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 1s
meraki_networks_syslog_servers.this_spoke: Refreshing state...
meraki_networks_appliance_connectivity_monitoring_destinations.this: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_web: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Refreshing state...
meraki_networks_appliance_firewall_settings.this: Refreshing state...
meraki_networks_traffic_analysis.this_spoke: Refreshing state...
meraki_networks_snmp.this: Refreshing state...
meraki_networks_group_policies.group_policy_internal: Refreshing state... [name=INTERNAL]
Planning failed. Terraform encountered an error while generating this plan.
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_internal,
│ on network.tf line 113, in resource "meraki_networks_group_policies" "group_policy_internal":
│ 113: resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation GetNetworkGroupPolicy
Could you please pass me this logs, but with DEBUG enabled? https://registry.terraform.io/providers/cisco-open/meraki/latest/docs#meraki_debug
I have had the debug turned on via the provide flag. This is the only output it gives. I even added the provider
Configuration
provider "meraki" {
meraki_debug = "true"
meraki_requests_per_second = 5
}
resource "meraki_networks_group_policies" "group_policy_internal" {
provider = meraki
name = "INTERNAL"
group_policy_id = "5"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "5"
}
}
resource "meraki_networks_group_policies" "group_policy_pan" {
provider = meraki
name = "PAN"
group_policy_id = "15"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "15"
}
depends_on = [meraki_networks_group_policies.group_policy_internal]
}
resource "meraki_networks_group_policies" "group_policy_byod" {
provider = meraki
name = "BYOD"
group_policy_id = "20"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "20"
}
depends_on = [meraki_networks_group_policies.group_policy_pan]
}
resource "meraki_networks_group_policies" "group_policy_guest" {
provider = meraki
name = "GUEST"
group_policy_id = "30"
network_id = local.this_network.id
vlan_tagging = {
settings = "custom"
vlan_id = "30"
}
depends_on = [meraki_networks_group_policies.group_policy_byod]
}
Output on second apply run.
Apply complete! Resources: 4 added, 0 changed, 0 destroyed.
fink@LTWXCGVT333:~/dev/meraki-terraform-test $ terraform apply
Acquiring state lock. This may take a few moments...
meraki_devices_appliance_uplinks_settings.this: Refreshing state...
data.meraki_networks.dev_networks: Reading...
data.meraki_networks.dev_networks: Read complete after 0s
meraki_networks_appliance_firewall_firewalled_services.this_snmp: Refreshing state...
meraki_networks_syslog_servers.this_spoke: Refreshing state...
meraki_networks_appliance_firewall_settings.this: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_web: Refreshing state...
meraki_networks_snmp.this: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_1: Refreshing state... [id=1]
meraki_networks_wireless_settings.this: Refreshing state...
meraki_networks_group_policies.group_policy_internal: Refreshing state... [name=INTERNAL]
meraki_networks_appliance_connectivity_monitoring_destinations.this: Refreshing state...
meraki_networks_appliance_vlans_settings.this_vlans: Refreshing state...
meraki_networks_traffic_analysis.this_spoke: Refreshing state...
meraki_networks_appliance_firewall_firewalled_services.this_icmp: Refreshing state...
meraki_networks_appliance_vlans.this_vlan_10: Refreshing state... [id=10]
meraki_networks_appliance_vlans.this_vlan_2: Refreshing state... [id=2]
meraki_networks_appliance_vlans.this_vlan_30: Refreshing state... [id=30]
meraki_networks_appliance_vlans.this_vlan_5: Refreshing state... [id=5]
meraki_networks_appliance_vlans.this_vlan_20: Refreshing state... [id=20]
Planning failed. Terraform encountered an error while generating this plan.
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_internal,
│ on network.tf line 113, in resource "meraki_networks_group_policies" "group_policy_internal":
│ 113: resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation GetNetworkGroupPolicy
╵
Could you export this var too: export TF_LOG="DEBUG"
And show me logs please..
Due to the log length i have just attached the two log files. It appeears the error is on the group policy lookup. The error says lookup of group policy # 5 fails.
2024-05-30T12:31:39.631-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:31:39 [DEBUG] Selecting method. Method 1 [false]
2024-05-30T12:31:39.632-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:31:39 [DEBUG] Selecting method. Method 2 [true false false false false false false false]
2024-05-30T12:31:39.632-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:31:39 [DEBUG] Selected method: GetOrganizationNetworks
2024-05-30T12:31:40.422-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:31:40
2024-05-30T12:31:40.423-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
2024-05-30T12:31:40.423-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ REQUEST ~~~
2024-05-30T12:31:40.424-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: GET /api/v1/organizations/783626335162466593/networks HTTP/1.1
2024-05-30T12:31:40.425-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HOST : api.meraki.com
2024-05-30T12:31:40.425-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS:
2024-05-30T12:31:40.426-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Accept: application/json
2024-05-30T12:31:40.426-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Authorization: Bearer ****c00cc
2024-05-30T12:31:40.427-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json
2024-05-30T12:31:40.428-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: User-Agent: go-meraki/1.44.1 MerakiTerraform/1.47.0 Cisco
2024-05-30T12:31:40.428-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:31:40.429-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ***** NO CONTENT *****
2024-05-30T12:31:40.430-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ------------------------------------------------------------------------------
2024-05-30T12:31:40.430-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ RESPONSE ~~~
2024-05-30T12:31:40.430-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: STATUS : 200 OK
2024-05-30T12:31:40.431-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: PROTO : HTTP/2.0
2024-05-30T12:31:40.431-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: RECEIVED AT : 2024-05-30T12:31:40.4217383-05:00
2024-05-30T12:31:40.432-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: TIME DURATION: 789.6594ms
2024-05-30T12:31:40.432-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS :
2024-05-30T12:31:40.433-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Cache-Control: no-cache, no-store, max-age=0, must-revalidate
2024-05-30T12:31:40.433-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json; charset=utf-8
data.meraki_networks.dev_networks: Read complete after 0s
2024-05-30T12:31:40.434-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Date: Thu, 30 May 2024 17:31:40 GMT
2024-05-30T12:31:40.434-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Expires: Fri, 01 Jan 1990 00:00:00 GMT
2024-05-30T12:31:40.435-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Link: <https://api.meraki.com/api/v1/organizations/783626335162466593/networks?perPage=1000&startingAfter=L_0>; rel=first, <https://api.meraki.com/api/v1/organizations/783626335162466593/networks?endingBefore=N_a&perPage=1000>; rel=last
2024-05-30T12:31:40.435-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Pragma: no-cache
2024-05-30T12:31:40.435-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Strict-Transport-Security: max-age=31536000; includeSubDomains
2024-05-30T12:31:40.436-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Vary: Accept-Encoding
2024-05-30T12:31:40.436-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Content-Type-Options: nosniff
2024-05-30T12:31:40.436-0500 [DEBUG] ReferenceTransformer: "meraki_networks_group_policies.group_policy_internal" references: []
2024-05-30T12:31:40.436-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Frame-Options: sameorigin
2024-05-30T12:31:40.437-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Request-Id: 085bfdf6895e38dbc9c9d6cf00580ad0
2024-05-30T12:31:40.437-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Robots-Tag: none
2024-05-30T12:31:40.438-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Runtime: 0.074115
2024-05-30T12:31:40.438-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Xss-Protection: 1; mode=block, 1; mode=block
2024-05-30T12:31:40.438-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:31:40.439-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: [
2024-05-30T12:31:40.439-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: {
2024-05-30T12:31:40.440-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "id": "L_783626335162467749",
2024-05-30T12:31:40.440-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "organizationId": "783626335162466593",
2024-05-30T12:31:40.440-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "name": "750-comm-meraki-lab",
2024-05-30T12:31:40.440-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "productTypes": [
2024-05-30T12:31:40.441-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "appliance",
2024-05-30T12:31:40.441-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "camera",
2024-05-30T12:31:40.441-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "cellularGateway",
2024-05-30T12:31:40.442-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "sensor",
2024-05-30T12:31:40.442-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "switch",
2024-05-30T12:31:40.442-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "wireless"
2024-05-30T12:31:40.442-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.443-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "timeZone": "America/Los_Angeles",
2024-05-30T12:31:40.443-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "tags": [
2024-05-30T12:31:40.443-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "us-east-1"
2024-05-30T12:31:40.444-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.444-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "enrollmentString": null,
2024-05-30T12:31:40.444-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "url": "https://n392.meraki.com/750-comm-meraki-/n/gEx5Zdig/manage/usage/list",
2024-05-30T12:31:40.445-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "notes": "",
2024-05-30T12:31:40.445-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "isBoundToConfigTemplate": false
2024-05-30T12:31:40.445-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:31:40.445-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: {
2024-05-30T12:31:40.446-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "id": "N_783626335162472839",
2024-05-30T12:31:40.446-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "organizationId": "783626335162466593",
2024-05-30T12:31:40.446-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "name": "rich-use1-dev-vmx1",
2024-05-30T12:31:40.446-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "productTypes": [
2024-05-30T12:31:40.447-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "appliance"
2024-05-30T12:31:40.447-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.447-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "timeZone": "America/Los_Angeles",
2024-05-30T12:31:40.447-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "tags": [
2024-05-30T12:31:40.448-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "us-east-1",
2024-05-30T12:31:40.448-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "vMX1"
2024-05-30T12:31:40.448-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.448-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "enrollmentString": null,
2024-05-30T12:31:40.448-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "url": "https://n392.meraki.com/rich-use1-dev-vm/n/p5A_bdig/manage/usage/list",
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "notes": "",
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "isBoundToConfigTemplate": false
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: {
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "id": "N_783626335162472840",
2024-05-30T12:31:40.449-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "organizationId": "783626335162466593",
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "name": "rich-use1-dev-vmx2",
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "productTypes": [
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "appliance"
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "timeZone": "America/Los_Angeles",
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "tags": [
2024-05-30T12:31:40.450-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "us-east-1",
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "vMX2"
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ],
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "enrollmentString": null,
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "url": "https://n392.meraki.com/rich-use1-dev-vm/n/Mum1ibig/manage/usage/list",
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "notes": null,
2024-05-30T12:31:40.451-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "isBoundToConfigTemplate": false
2024-05-30T12:31:40.452-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:31:40.452-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ]
2024-05-30T12:31:40.452-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
2024-05-30T12:31:40.452-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Value switched to prior value due to semantic equality logic: tf_attribute_path=organization_id tf_provider_addr=registry.terraform.io/CiscoDevNet/meraki tf_req_id=537ad6ea-7b72-c9a2-92f2-1b58e213f887 @caller=github.com/hashicorp/terraform-plugin-framework@v1.7.0/internal/fwschemadata/value_semantic_equality.go:87 @module=sdk.framework tf_data_source_type=meraki_networks tf_rpc=ReadDataSource timestamp=2024-05-30T12:31:40.427-0500
meraki_networks_group_policies.group_policy_internal: Refreshing state... [name=INTERNAL]
2024-05-30T12:31:40.765-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:31:40
2024-05-30T12:31:40.766-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
2024-05-30T12:31:40.767-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ REQUEST ~~~
2024-05-30T12:31:40.767-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: GET /api/v1/networks/L_783626335162467749/groupPolicies/5 HTTP/1.1
2024-05-30T12:31:40.768-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HOST : api.meraki.com
2024-05-30T12:31:40.769-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS:
2024-05-30T12:31:40.769-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Accept: application/json
2024-05-30T12:31:40.770-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Authorization: Bearer ****c00cc
2024-05-30T12:31:40.771-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json
2024-05-30T12:31:40.771-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: User-Agent: go-meraki/1.44.1 MerakiTerraform/1.47.0 Cisco
2024-05-30T12:31:40.772-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:31:40.773-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ***** NO CONTENT *****
2024-05-30T12:31:40.773-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ------------------------------------------------------------------------------
2024-05-30T12:31:40.774-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ RESPONSE ~~~
2024-05-30T12:31:40.775-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: STATUS : 400 Bad Request
2024-05-30T12:31:40.776-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: PROTO : HTTP/2.0
2024-05-30T12:31:40.776-0500 [ERROR] vertex "meraki_networks_group_policies.group_policy_internal" error: Failure when executing GetNetworkGroupPolicy
2024-05-30T12:31:40.776-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: RECEIVED AT : 2024-05-30T12:31:40.7646526-05:00
2024-05-30T12:31:40.777-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: TIME DURATION: 305.8623ms
2024-05-30T12:31:40.778-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS :
2024-05-30T12:31:40.778-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Cache-Control: no-cache, no-store, max-age=0, must-revalidate
2024-05-30T12:31:40.778-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json; charset=utf-8
2024-05-30T12:31:40.777-0500 [ERROR] vertex "meraki_networks_group_policies.group_policy_internal (expand)" error: Failure when executing GetNetworkGroupPolicy
2024-05-30T12:31:40.779-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Date: Thu, 30 May 2024 17:31:40 GMT
2024-05-30T12:31:40.780-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Expires: Fri, 01 Jan 1990 00:00:00 GMT
2024-05-30T12:31:40.780-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Pragma: no-cache
2024-05-30T12:31:40.781-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Strict-Transport-Security: max-age=31536000; includeSubDomains
2024-05-30T12:31:40.781-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Content-Type-Options: nosniff
2024-05-30T12:31:40.780-0500 [WARN] Planning encountered errors, so plan is not applyable
2024-05-30T12:31:40.781-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Frame-Options: sameorigin
2024-05-30T12:31:40.783-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Request-Id: 4c181a78170f8fd61d42f33fe0478121
2024-05-30T12:31:40.783-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Robots-Tag: none
2024-05-30T12:31:40.784-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Runtime: 0.118534
2024-05-30T12:31:40.784-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Xss-Protection: 1; mode=block
2024-05-30T12:31:40.784-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:31:40.785-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: {
2024-05-30T12:31:40.785-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "errors": [
2024-05-30T12:31:40.785-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "No group policy with id 5"
2024-05-30T12:31:40.786-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ]
2024-05-30T12:31:40.786-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:31:40.786-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
╷
│ Error: Failure when executing GetNetworkGroupPolicy
│
│ with meraki_networks_group_policies.group_policy_internal,
│ on network.tf line 113, in resource "meraki_networks_group_policies" "group_policy_internal":
│ 113: resource "meraki_networks_group_policies" "group_policy_internal" {
│
│ error with operation GetNetworkGroupPolicy
╵
2024-05-30T12:31:40.787-0500 [ERROR] provider.terraform-provider-meraki_v0.2.2-alpha: Response contains error diagnostic: diagnostic_severity=ERROR tf_proto_version=6.4 tf_resource_type=meraki_networks_group_policies tf_rpc=ReadResource @caller=github.com/hashicorp/terraform-plugin-go@v0.22.2/tfprotov6/internal/diag/diagnostics.go:58 @module=sdk.proto diagnostic_detail="error with operation GetNetworkGroupPolicy" diagnostic_summary="Failure when executing GetNetworkGroupPolicy" tf_provider_addr=registry.terraform.io/CiscoDevNet/meraki tf_req_id=9a962e95-a712-e6f0-2244-f469a4e97ec9 timestamp=2024-05-30T12:31:40.767-0500
2024-05-30T12:31:40.788-0500 [INFO] backend-s3: Unlocking remote state: tf_backend.lock.id=f35d0da7-48cd-add1-f63b-9c0fa3948cfa tf_backend.operation=Unlock tf_backend.req_id=95d7cb15-6189-50e9-bc1a-aaaeac64804e tf_backend.s3.bucket=is-isss-artifacts-<-blanked->-us-east-1 tf_backend.s3.path=terraform/750-comm-meraki-lab/state
2024-05-30T12:31:40.789-0500 [DEBUG] backend-s3: HTTP Request Sent: aws.dynamodb.consistent_read=true aws.dynamodb.projection="LockID, Info" aws.dynamodb.table_names=["terraform-state-locking"] aws.region=us-east-1 db.system=dynamodb rpc.method=GetItem rpc.service=DynamoDB rpc.system=aws-api tf_aws.sdk=aws-sdk-go-v2 tf_aws.signing_region="" tf_backend.lock.id=f35d0da7-48cd-add1-f63b-9c0fa3948cfa tf_backend.operation=Unlock tf_backend.req_id=95d7cb15-6189-50e9-bc1a-aaaeac64804e tf_backend.s3.bucket=is-isss-artifacts-<-blanked->-us-east-1 tf_backend.s3.path=terraform/750-comm-meraki-lab/state http.method=POST http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.8.4 (+https://www.terraform.io) aws-sdk-go-v2/1.25.3 os/linux lang/go#1.22.1 md/GOOS#linux md/GOARCH#amd64 api/dynamodb#1.30.4" http.request_content_length=201 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=ASIA************6KVP/20240530/us-east-1/dynamodb/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=*****" http.request.header.x_amz_target=DynamoDB_20120810.GetItem net.peer.name=dynamodb.us-east-1.amazonaws.com http.url=https://dynamodb.us-east-1.amazonaws.com/ http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-amz-json-1.0 http.request.header.accept_encoding=identity http.request.header.x_amz_date=20240530T173140Z http.request.header.amz_sdk_invocation_id=ad720259-43a0-483b-95b9-b1f5a4d3cbee http.request.header.amz_sdk_request="attempt=1; max=5"
http.request.body=
| {"ConsistentRead":true,"Key":{"LockID":{"S":"is-isss-artifacts-<-blanked->-us-east-1/terraform/750-comm-meraki-lab/state"}},"ProjectionExpression":"LockID, Info","TableName":"terraform-state-locking"}
[First apply - success.txt](https://github.com/cisco-open/terraform-provider-meraki/files/15503682/First.apply.-.success.txt)
[Second apply - failure.txt](https://github.com/cisco-open/terraform-provider-meraki/files/15503683/Second.apply.-.failure.txt)
here is the debug if the files didn't attach that shows the group policy with ID 100 vs 5
2024-05-30T12:28:35.985-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:28:35
2024-05-30T12:28:35.986-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
2024-05-30T12:28:35.986-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ REQUEST ~~~
2024-05-30T12:28:35.987-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: GET /api/v1/networks/L_783626335162467749/groupPolicies HTTP/1.1
2024-05-30T12:28:35.987-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HOST : api.meraki.com
2024-05-30T12:28:35.988-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS:
2024-05-30T12:28:35.988-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Accept: application/json
2024-05-30T12:28:35.989-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Authorization: Bearer ****c00cc
2024-05-30T12:28:35.989-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json
2024-05-30T12:28:35.989-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: User-Agent: go-meraki/1.44.1 MerakiTerraform/1.47.0 Cisco
2024-05-30T12:28:35.990-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:28:35.990-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ***** NO CONTENT *****
2024-05-30T12:28:35.990-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ------------------------------------------------------------------------------
2024-05-30T12:28:35.991-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ~~~ RESPONSE ~~~
2024-05-30T12:28:35.991-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: STATUS : 200 OK
2024-05-30T12:28:35.992-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: PROTO : HTTP/2.0
2024-05-30T12:28:35.992-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: RECEIVED AT : 2024-05-30T12:28:35.9851738-05:00
2024-05-30T12:28:35.992-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: TIME DURATION: 292.0574ms
2024-05-30T12:28:35.993-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: HEADERS :
2024-05-30T12:28:35.993-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Cache-Control: no-cache, no-store, max-age=0, must-revalidate
2024-05-30T12:28:35.993-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Content-Type: application/json; charset=utf-8
2024-05-30T12:28:35.994-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Date: Thu, 30 May 2024 17:28:35 GMT
2024-05-30T12:28:35.994-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Expires: Fri, 01 Jan 1990 00:00:00 GMT
2024-05-30T12:28:35.994-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Pragma: no-cache
2024-05-30T12:28:35.994-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Strict-Transport-Security: max-age=31536000; includeSubDomains
2024-05-30T12:28:35.995-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: Vary: Accept-Encoding
2024-05-30T12:28:35.995-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Content-Type-Options: nosniff
2024-05-30T12:28:35.995-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Frame-Options: sameorigin
2024-05-30T12:28:35.995-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Request-Id: 45300013012370949b5aadfb1d98499e
2024-05-30T12:28:35.996-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Robots-Tag: none
2024-05-30T12:28:35.996-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Runtime: 0.098988
2024-05-30T12:28:35.996-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: X-Xss-Protection: 1; mode=block, 1; mode=block
2024-05-30T12:28:35.996-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: BODY :
2024-05-30T12:28:35.996-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: [
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: {
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "groupPolicyId": "100",
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "name": "INTERNAL",
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "scheduling": {
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "enabled": false,
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "monday": {
2024-05-30T12:28:35.997-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:35.998-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:35.998-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:35.998-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:35.998-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "tuesday": {
2024-05-30T12:28:35.998-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "wednesday": {
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:35.999-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:36.000-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:36.000-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.000-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "thursday": {
2024-05-30T12:28:36.000-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:36.000-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:36.001-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:36.001-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.001-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "friday": {
2024-05-30T12:28:36.001-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:36.001-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:36.002-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:36.002-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.002-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "saturday": {
2024-05-30T12:28:36.002-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:36.002-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "sunday": {
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "active": true,
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "from": "00:00",
2024-05-30T12:28:36.003-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "to": "24:00"
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "bandwidth": {
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "bandwidthLimits": {
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "limitUp": null,
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "limitDown": null
2024-05-30T12:28:36.004-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "firewallAndTrafficShaping": {
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "trafficShapingRules": [],
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "l3FirewallRules": [],
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "l7FirewallRules": []
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "contentFiltering": {
2024-05-30T12:28:36.005-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "allowedUrlPatterns": {
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "patterns": []
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "blockedUrlPatterns": {
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "patterns": []
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "blockedUrlCategories": {
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "categories": []
2024-05-30T12:28:36.006-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "splashAuthSettings": "network default",
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "vlanTagging": {
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "custom",
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "vlanId": "5"
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: },
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "bonjourForwarding": {
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "settings": "network default",
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: "rules": []
2024-05-30T12:28:36.007-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:28:36.008-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: }
2024-05-30T12:28:36.008-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ]
2024-05-30T12:28:36.008-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: ==============================================================================
2024-05-30T12:28:36.008-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:28:35 [DEBUG] resp: [map[Bandwidth:0xc00039b0b0 BonjourForwarding:0xc00039b1b8 ContentFiltering:0xc00039b158 FirewallAndTrafficShaping:0xc000694c60 GroupPolicyID:100 Name:INTERNAL Scheduling:0xc000416c00 SplashAuthSettings:network default VLANTagging:0xc00057a840]]
2024-05-30T12:28:36.536-0500 [DEBUG] provider.terraform-provider-meraki_v0.2.2-alpha: 2024/05/30 12:28:36
@fmunozmiranda I found i had accidently left a group_policy_id configured in the resource code block. Since this appears to be a read in only item is it possible to error out if a group_policy_id is passed in or is there some case where a group_policy_id would be passed in?
Yes, it´s possible, thank you for your feedback. But removing the parameter group_policy_id it works for you? Or you still have the same issue?
After removing the hardcoded group_policy_id everything works correct on the first and second and subsequent apply so i believe this issue is resolved.
I´m going to close this issue in next release, I will remove group_policy_id from parameters of request. Thank you.
Prerequisites
Describe the bug When applying and managing multiple group policies in code, the initial apply works correctly but every subsequent apply causes the group policy to attempt to overwrite the wrong policies due to the refresh state returning all policies at once instead of the specific policy applied by the resource call. Appears to be due to terraform state not tracking the return group_policy ID as a key and only the network_id
Expected behavior Based on each resource call each group policy would be maintained and independently checked and validated on state refresh instead of assuming the first policy returned is the one each resource is associated too.
Screenshots
Environment (please complete the following information):
Additional context Code attempted to be applied and then applied so only state refresh should occur.
Frist successful apply, due to possible similar state refresh / complete message not responding Had to rerun and 2 policies applied on second run.
Failed second apply. again due to state file/response strangeness only two policies appear to have been put in state and failed refresh.