-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_kinesis_firehose_delivery_stream can become permanently dirty #6053
Comments
Hi @nhnicwaller 👋 Sorry for the odd behavior! I imagine in this case the AWS console that is applying a "default" data processing configuration (set to You have two options to workaround this in the meantime. 😅 Add a disabled data format conversion configuration in Terraform: resource "aws_kinesis_firehose_delivery_stream" "logs" {
# ... other configuration ...
extended_s3_configuration {
# ... other configuration ...
data_format_conversion_configuration {
enabled = false
}
}
} Although I believe in that case the Terraform resource will also require Instead, you can tell Terraform to always ignore the problematic attributes using resource "aws_kinesis_firehose_delivery_stream" "logs" {
# ... other configuration ...
lifecycle {
ignore_changes = [
"extended_s3_configuration.0.data_format_conversion_configuration",
"extended_s3_configuration.0.data_format_conversion_configuration.0.enabled",
]
}
} Hope this helps in the meantime. |
Amazing response, thank you very much! Both techniques to silence this warning are very helpful to know until such time as the root cause is fixed. |
I've just been bitten by this same problem. We're typically using 2.6.0, I tried with 2.14.0 in case it had been fixed. The |
With terraform 0.12.6 neither of the workarounds work. The lifecycle trick still results in a broken state after refresh ( |
The fix for the original issue has been merged and will release with version 2.25.0 of the Terraform AWS Provider, later this week. |
This has been released in version 2.25.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform Version
Affected Resource(s)
Terraform Configuration Files
Debug Output
Too long to anonymize. Will try to provide if absolutely required.
Expected Behavior
Terraform should converge the stack such that when
plan
is run immediately afterapply
there should be no changes necessary.Actual Behavior
Once the Firehose delivery stream is "dirty" there is no way to mark it as clean again in Terraform, short of actually deleting and re-creating the Firehose delivery stream. This is what it looks like when dirty:
Steps to Reproduce
aws_kinesis_firehose_delivery_stream
in Terraformterraform apply
terraform apply
terraform plan
will be dirty, despite the fact thatapply
was just runThe text was updated successfully, but these errors were encountered: