-
Notifications
You must be signed in to change notification settings - Fork 9.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Docs]: resource/aws_cloudwatch_event_rule #34988
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Looks like the AWS API is now returning a 400 error for this scenario: │ Error: creating EventBridge Rule (capture-aws-sign-in): ValidationException: ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS rule state is not supported with scheduled rule expressions.
│ status code: 400, request id: c8f01078-41a9-4fc0-a7e3-76997c3189bc For good measure, I will add a note in the resource doc. |
This functionality has been released in v5.39.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Documentation Link
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule
Description
We migrated all aws_cloudwatch_event_rule resources from "is_enabled=true" to "state=ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS". But that stopped all scheduled event_rules from being triggered.
AWS explained this as "works as designed" and will implement an error on the combination of a scheduled event_rule and ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS.
Is this something to:
References
#34510
Would you like to implement a fix?
No
The text was updated successfully, but these errors were encountered: