-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Umbrella] ISO-friendly Tagging #22532
Comments
|
@blafrisch @lorengordon We're doing our best to anticipate the errors but since they often vary from service to service, we are not 100% confident these fixes will guard against the exact errors for all these services. This is attempt #1. 🤞 Now with the guard structure in place, updating for the correct error is pretty trivial. But, as we cannot test ourselves, any help with that would be much appreciated. The error code and message would be ideal. Here are the error codes that v3.72.0 will be guarding against: CloudWatch:
ECR:
ECS:
ELBv2:
EventBridge (CloudWatch Events):
IAM
SNS:
SQS:
|
Is there a test suite yet to gather results from various partitions/regions? |
Yes and no. Formally, we only run daily tests across |
We'll give it a go, thanks for the heads up! |
I'll keep this issue open until we hear back on success and/or failure. |
This functionality has been released in v3.72.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
@YakDriver we were able to deploy v3.72.0 and test with the For
For
|
@YakDriver can confirm the same error with v3.72.0 in aws-iso. In the console, the resource appears like its created, at least in the case of cloudwatch event rule. But the Testing continues. |
These are services we've heard back about where tags are now not causing problems. @lorengordon @spavuluri @blafrisch Let us know if you run into problems! Or, if these are working... (These may differ between iso and iso-b.)
|
@YakDriver I can confirm that the most recent changes were successful in |
@YakDriver no issues encountered for |
@spavuluri @blafrisch Millions of thanks!! We have heard back that ECS continues to be a problem but still need to find out what the exact error message is. If anyone has the AWS error code (e.g., |
ECS handles tagging differently than (most?) every other service. As a result, it took a different approach than the others but hopefully it should be working now with #23030. If we don't hear back for anyone in the next 30 days on more tagging problems in ISO, I'll close this issue on or after March 8, 2022. Thanks for all the help! |
@YakDriver I see the PR fixing ECS tags was marked for the v4 release... Does that mean it won't make it into a v3 release? |
That is likely correct. Any estimate of showstoppers with v4 and ISO? |
Just makes it harder to test, is all, with all the breaking changes. Folks might need some time to rewrite configs to account for that, before they can report that things are or are not working. |
@YakDriver v3.74.0 did fix most of the errors relating to tagging, however I am receiving the following error during terraform apply for
|
The ECS fixes have been backported to v3.74 and are available in v3.74.3. |
I ran into this this today with the following resources: |
@AbrohamLincoln Thank you for letting us know. We'll work on a fix. |
@AbrohamLincoln For ElastiCache fixes, see #23980. When 4.9 is released (next week I believe), please give it a test and let us know if it works. We are unable to test in |
I've seen some differing information here regarding IAM tags You cannot tag the following resources in
This affects the ability to use provider level default tags when managing any of the above resources. |
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Relates #18593
Considerations
Five (at least) considerations relate to the problem of tagging support in non-standard AWS partitions:
Design
A design to handle these considerations:
Tag on Create
Attempt tag on create
len(tags) == 0
Tag after Create
Only if tag on create fails, check error and, if appropriate, try create without tags.
Read
Update
New or Affected Resource(s)
References
aws-iso
,aws-iso-b
,aws-iso-e
,aws-iso-f
partitions #18593The text was updated successfully, but these errors were encountered: