Closed AhmedMItman closed 5 months ago
I would suggest reading through the docs https://docs.aws.amazon.com/dms/latest/userguide/security-iam.html#CHAP_Security.APIRole
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Description
We have setup a DMS for multiple folders and each folder should deal with different RDS(s) with different DMS endpoints, the first folder apply went successfully as the terrarform create roles in aws with names
dms-access-for-endpoint
, anddms-cloudwatch-logs-role
. while applying the second folder the terraform produced an conflict error that the iam roles are already existing although we're already passing theaccess_iam_role_name
with a value andaccess_iam_role_use_name_prefix
is already equaltrue
Here the exact error
What is expected
We expected that the IAM Roles should be differ once we're already passing the required inputs such like access_iam_role_name and access_iam_role_use_name_prefix
Steps to reproduce the behavior
We've found that the names are adding as hardcoded and the prefix is not working such like it shows in the below block
Don't we need to keep the names in the resources to be variable ?