Everytime we run terraform plan / apply, the aws lakeformation permission should not create a new permission with permission SELECT, resource type TABLE.
When we run the terraform destroy, this permission SELECT and resource type TABLE should be destroyed.
The aws_lakeformation_permissions with permission SELECT / resource type TABLE should be stored in the remote statefile.
I think the root cause is the resource is not stored in the statefile which cause the recreation of the resource.
Actual Behavior
Everytime we run terraform plan / apply, the aws lakeformation permission keeps creating a new permission with permission SELECT, resource type TABLE.
Also when we run the terraform destroy, this permission SELECT and resource type TABLE is not destroyed. The output of "terraform destroy" returns no changes.
I also check the remote statefile, and I do not see the aws_lakeformation_permissions with permission SELECT / resource type TABLE in the statefile.
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.
Volunteering to Work on This Issue
If you are interested in working on this issue, please leave a comment.
If this would be your first contribution, please review the contribution guide.
Terraform Core Version
v1.3.6
AWS Provider Version
4.46.0
Affected Resource(s)
aws_lakeformation_permissions with lf_tag_policy
Expected Behavior
I think the root cause is the resource is not stored in the statefile which cause the recreation of the resource.
Actual Behavior
Relevant Error/Panic Output Snippet
No response
Terraform Configuration Files
Steps to Reproduce
Debug Output
No response
Panic Output
No response
Important Factoids
No response
References
No response
Would you like to implement a fix?
None