Closed ashevade1 closed 2 years ago
Hey @ashevade1 π Thank you for taking the time to raise this! So that we have all of the necessary information in order to look into this, can you update the issue description with the rest of the information requested in the bug report template?
HI I did attach the required information. @justinretzolk
This functionality has been released in v4.13.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.
For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!
I'm going to lock this issue because it has been closed for 30 days β³. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Community Note
Terraform CLI and Terraform AWS Provider Version
hashicorp/aws: version = "~> 4.6.0"
Affected Resource(s)
Terraform Configuration Files
Panic Output
Expected Behavior
Existing cluster should be modified , with IAM based client authentication
Actual Behavior
Existing cluster is replaced and destroyed .
Steps to reproduce
Created a MSK Cluster without any authentication. Tried adding support for SASL and IAM authentication by adding this
an attempt to appy the plan says it will replace the MSK cluster. However using the AWS management console, its does allow enabling SASL , IAM based authentication on an pre existing unautheticated cluster Is there a way to prevent replacement of the cluster while allowing addition of SAL, IAM authntication. Blocked on it and any help is appreciated.
.