Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Docs]: resource/aws_cloudwatch_event_rule #34988

Closed
ericrichtert opened this issue Dec 19, 2023 · 4 comments · Fixed by #35970
Closed

[Docs]: resource/aws_cloudwatch_event_rule #34988

ericrichtert opened this issue Dec 19, 2023 · 4 comments · Fixed by #35970
Labels
documentation Introduces or discusses updates to documentation. service/cloudwatch Issues and PRs that pertain to the cloudwatch service.
Milestone

Comments

@ericrichtert
Copy link
Contributor

Documentation Link

https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule

Description

We migrated all aws_cloudwatch_event_rule resources from "is_enabled=true" to "state=ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS". But that stopped all scheduled event_rules from being triggered.
AWS explained this as "works as designed" and will implement an error on the combination of a scheduled event_rule and ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS.

Is this something to:

  • write down in the docs?
  • add as validation?
  • both?

References

#34510

Would you like to implement a fix?

No

@ericrichtert ericrichtert added the documentation Introduces or discusses updates to documentation. label Dec 19, 2023
Copy link

Community Note

Voting for Prioritization

  • Please vote on this issue by adding a 👍 reaction to the original post to help the community and maintainers prioritize this request.
  • Please see our prioritization guide for information on how we prioritize.
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.

Volunteering to Work on This Issue

  • If you are interested in working on this issue, please leave a comment.
  • If this would be your first contribution, please review the contribution guide.

@terraform-aws-provider terraform-aws-provider bot added the needs-triage Waiting for first response or review from a maintainer. label Dec 19, 2023
@justinretzolk justinretzolk added service/cloudwatch Issues and PRs that pertain to the cloudwatch service. and removed needs-triage Waiting for first response or review from a maintainer. labels Jan 12, 2024
@acwwat
Copy link
Contributor

acwwat commented Feb 25, 2024

Looks like the AWS API is now returning a 400 error for this scenario:

│ Error: creating EventBridge Rule (capture-aws-sign-in): ValidationException: ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS rule state is not supported with scheduled rule expressions.    
│       status code: 400, request id: c8f01078-41a9-4fc0-a7e3-76997c3189bc

For good measure, I will add a note in the resource doc.

Copy link

github-actions bot commented Mar 1, 2024

This functionality has been released in v5.39.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!

Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Mar 31, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
documentation Introduces or discusses updates to documentation. service/cloudwatch Issues and PRs that pertain to the cloudwatch service.
Projects
None yet
3 participants