Closed rschwartz-tpn closed 1 year ago
Hi @rschwartz-tpn, thank you for raising this issue. Making an initial pass at the error behavior you're seeing and given the AWS API indicates the error is retryable, I believe this will have to be addressed w/in the resource code by adding retry handling within the resource's Delete CRUD operation; currently we only call DeleteVPCAssociationAuthorization
once and return on error.
The same error seems to happen sometimes also when creating multiple authorizations. Another apply
succeeds, so retry really should help.
Related #18752
So I have come across this error, using -parallelism=4 reduces the errors. I am trying to change 9 authorisations at the same time and get 4 errors. Adding the parallelism reduces this to 2 errors.
Just ran into this with creates; very annoying since the combination of vpcs and rules to be shared in my case results in thousands of objects, so even just refreshing the state to do another apply takes a very long time.
This functionality has been released in v5.1.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.
For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Community Note
Terraform CLI and Terraform AWS Provider Version
Terraform v0.12.29
Affected Resource(s)
Terraform Configuration Files
Debug Output
Expected Behavior
I would have expected the initial apply to destroy all resources without error.
Steps to Reproduce
terraform apply
that runs the above codeImportant Factoids
I've experienced no problems when creating the resource - which adds 3 VPCs to an existing PHZ that already has 1 VPC associated to it.
I have run this twice (on two different test zones I created and deleted) - the first time, two VPCs did not destroy correctly and I had to run
apply
two more times for all the resources to get destroyed. The plan/apply listing above was for the second PHZ test.Not sure if this is a factor, but the VPCs we are adding and removing are in different Regions, with the exception of us-east-1 where there are 2 VPC associations - of which we are removing one.
0000