-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
provider/aws: Support eventually consistent aws_security_group_rule #6325
provider/aws: Support eventually consistent aws_security_group_rule #6325
Conversation
- Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules. - Testing has shown that several times that we had to exceed 20 attempts before the SG was actually returned
- Adjusting to use resource.Retry - Extract lookup method for matching ipPermissions set
…y-Group-Rule-Evn-Consis
Checked this out locally, looks good! All the acceptance tests passed for me, so we'll pull this in. Nice work! |
Great, thanks! |
Great! |
…ashicorp#6325) * TF-6256 - SG Rule Retry - Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules. - Testing has shown that several times that we had to exceed 20 attempts before the SG was actually returned * TF-6256 - Refactor of rule lookup - Adjusting to use resource.Retry - Extract lookup method for matching ipPermissions set
…ashicorp#6325) * TF-6256 - SG Rule Retry - Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules. - Testing has shown that several times that we had to exceed 20 attempts before the SG was actually returned * TF-6256 - Refactor of rule lookup - Adjusting to use resource.Retry - Extract lookup method for matching ipPermissions set
…ashicorp#6325) * TF-6256 - SG Rule Retry - Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules. - Testing has shown that several times that we had to exceed 20 attempts before the SG was actually returned * TF-6256 - Refactor of rule lookup - Adjusting to use resource.Retry - Extract lookup method for matching ipPermissions set
…ashicorp#6325) * TF-6256 - SG Rule Retry - Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules. - Testing has shown that several times that we had to exceed 20 attempts before the SG was actually returned * TF-6256 - Refactor of rule lookup - Adjusting to use resource.Retry - Extract lookup method for matching ipPermissions set
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Found that there are several instances when AWS API is busy that the SG describe will not return the appropriate set of permissions. We have observed this taking over 2 minutes in the past.
NOTE: There are a few things that I could use another set of eyes on or clarification around:
TestAccAWSSecurityGroupRule_Egress
test fails for me, but it also fails on the master branch without any of my modifications as well.resourceAwsSecurityGroupRuleRead
to lookup the item after creation does quite a bit there. I was unclear why the state file was mapped to a ipPermission with the expandIPPerm, an explicit match was found and then those same values were reset on the state file with the values from the EC2 ip permission. If this is significant I could not understand whyFixes #6256