Open ncbrown1 opened 2 years ago
For future readers, this is my current workaround:
azurerm_kusto_cluster_managed_private_endpoint
to include a depends_on
meta-argument to ensure that it will only be provisioned after all of your Kusto Clusters and private link resources are created.terraform apply
and wait until the first provisioning/locking error occursterraform plan -out tfplan.out -target module.kusto_managed_pe
or whatever module containing your azurerm_kusto_cluster_managed_private_endpoint
resources is, so that you can scope the next apply operation to only include the managed private endpoint resourcesterraform apply -parallelism=1 tfplan.out
so each managed private endpoint is created sequentially without parallelism.terraform apply
again with default parallelism.
Is there an existing issue for this?
Community Note
Terraform Version
1.2.9
AzureRM Provider Version
3.23.0
Affected Resource(s)/Data Source(s)
azurerm_kusto_cluster_managed_private_endpoint
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
If this is a matter of locking the kusto cluster resource, each
azurerm_kusto_cluster_managed_private_endpoint
resource should wait to start executing until it can claim the lock so that the entireterraform apply
operation does not fail and each resource can be created sequentially.Actual Behaviour
Only one
azurerm_kusto_cluster_managed_private_endpoint
resource can be provisioned successfully at a time, then any additional resources fail because they believe that the cluster is under maintenance (likely because the first resource provisioning operation claimed some sort of lock on the cluster)Steps to Reproduce
azurerm_kusto_cluster_managed_private_endpoint
resource block which creates one managed private endpoint for each pair of (kusto cluster, private link resource)Important Factoids
No response
References
Very similar to issue #16471