-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
provider/aws: Add autoscaling_policy + cloudwatch_metric_alarm #2201
Conversation
@radeksimko since you're the one with most recent context - can you give a quick rundown of remaining nits? if no time, that's 👌 |
@phinze Yeah, I intend to do so for sure, I'm just not sure when. 😺 Either way I know I will need these resources in the project I'm working on at some point, so it's motivating. 😃 |
81435f3
to
886e01e
Compare
4eb9c26
to
70ffef3
Compare
fd56d25
to
2cb461a
Compare
no.2 I would vote that true should be the default and only explicitly disabled. Thanks for this btw, I was just thinking this a.m. about how I was going to manage these alarms. |
Credit goes mostly to @xaptronic I've just done a few enhancements to otherwise good work 😃 |
2cb461a
to
90e5475
Compare
@phinze @catsby Any ideas on #2201 (comment) - i.e. The PR is almost ready to be merged when we clear out these two small things. |
I'm +1 on renaming policy_arn to arn - I had named it as present to match up with the AWS api. I gather the idea behind Terraform is not only to provide cardboard and glue around APIs but to also make it easier and better to work with these APIs. I don't see why setting actions_enabled to default true would be a problem, other than a divergence from the base API, but it enables the common use case which is the point of terraform right? |
This is most definitely true! However, we're trying to walk a fine line of improving UX wherever we can without introducing too many foreign abstractions or new behavior. I think the We have precedent of diverging from AWS APIs in certain cases where it makes life easier for a TF user (e.g. security_group.description). I believe this seems to be another case where it's warranted, so I'd be good to flip the default like you suggest @radeksimko. To restate the general case: we should always default to the upstream API, and only diverge where it clearly improves UX for Terraform users and does not unreasonably increase the potential for confusion. It's a balance between applying the "Principle of Least Astonishment" to Terraform users unfamiliar with AWS and Terraform users very familiar with AWS. tl;dr - +1 on both counts @radeksimko 😀 |
90e5475
to
8fb8a19
Compare
8fb8a19
to
14f4e5f
Compare
OK, thank you for the feedback & @phinze's explanation, both things fixed, merging in... |
provider/aws: Add autoscaling_policy + cloudwatch_metric_alarm
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
This is @xaptronic's work from #1585 which I merely took and squashed those 39 commits to 2 + rebased latest changes from master, so it's up to date and can be eventually merged without any conflicts.
Test plan