Closed gigabytte closed 4 months ago
Great work, thanks for the quick feedback and feature implementation. Issues Ive found so far while upgrading an existing mesh without custom CA certs. Looks like API call requires the definition of Istio ASM version when applying a PATCH call against the mesh. Meaning provider should expose the revisions
attribute.
Example json body
"serviceMeshProfile": {
"mode": "Istio",
"istio": {
"components": {
"ingressGateways": [
{
"enabled": true,
"mode": "Internal"
}
],
"egressGateways": [
{
"enabled": true
}
]
},
"certificateAuthority": {
"plugin": {
"keyVaultId": "/subscriptions/854c9ddb-fe9e-4aea-8d58-99ed88282881/resourceGroups/ddama-test/providers/Microsoft.KeyVault/vaults/my-akv",
"certObjectName": "ca-cert",
"keyObjectName": "ca-key",
"rootCertObjectName": "root-cert",
"certChainObjectName": "cert-chain"
}
},
"revisions": [
"asm-1-17"
]
}
}
Error reported from Azure:
│ Error: updating Kubernetes Cluster (Subscription: "xxxxxxxxxxxxxxxxxxxxx"
│ Resource Group Name: "xxxxxxxxxxxxxxxx"
│ Kubernetes Cluster Name: "xxxxxxxxxxxxx"): performing CreateOrUpdate: unexpected status 400 (400 Bad Request) with response: {
│ "code": "BadRequest",
│ "details": null,
│ "message": "Requested change in revisions is not allowed. Reason: ServiceMeshProfile revision field must not be empty.",
│ "subcode": ""
│ }
│
│ with module.main.module.aks["xxxxxxx"].azurerm_kubernetes_cluster.main,
│ on .terraform/modules/main.aks/main.tf line 39, in resource "azurerm_kubernetes_cluster" "main":
│ 39: resource "azurerm_kubernetes_cluster" "main" {
@stephybun due to error above can we reopen this issue?
@gigabytte this PR exposes the revisions
attribute, however due to the behaviour of the API this field will be added as a Required
attribute which is a breaking change. Since https://github.com/hashicorp/terraform-provider-azurerm/issues/25724 is tracking the feature request for this field I'd prefer to not re-open this and would suggest subscribing to the issue and/or the PR for updates.
We're currently heads down in preparation for the next major release of the provider which will include this change, so please bear with us..
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Is there an existing issue for this?
Community Note
Description
Looking for support similar to that of provided azapi reference below. The Ability to provide custom ca cert for Istio mesh via key vault.
New or Affected Resource(s)/Data Source(s)
azurerm_3.107.0
Potential Terraform Configuration
References
No response