Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: AWS Ignore Tag Ammendments #2180

Closed
StevePorter92 opened this issue Jun 1, 2015 · 3 comments
Closed

Feature Request: AWS Ignore Tag Ammendments #2180

StevePorter92 opened this issue Jun 1, 2015 · 3 comments

Comments

@StevePorter92
Copy link

Currently, our instances create EC2 tags on bootstrapping to easily be able to identify the version of our infrastructure they are running.

On the next apply, these tags get deleted as they were not created by terraform.

~ aws_instance.instance-datastore
    tags.#:          "2" => "1"
    tags.puppet: "182" => ""

Would anybody else would find this useful, or is there is a better solution to this?

@StevePorter92 StevePorter92 changed the title Feature Request: AWS Ignore Tag Ammendments on Apply Feature Request: AWS Ignore Tag Ammendments Jun 1, 2015
@phinze
Copy link
Contributor

phinze commented Jun 7, 2015

Going to consider this covered by the forthcoming ignore_changes feature in #2018. Feel free to chime in if you disagree! 👍

@emoshaya
Copy link

We are using a Jenkins plugin to deploy a service onto AWS instances and the plugin would then create/update 'VERSION' tag for the instance(s). Unfortunately, Terraform deletes this tag unless there's a way to ignore it. Is there a way to ignore just a single tag, e.g. 'VERSION' as opposed to ignoring all tags for a specific instance? I'd really appreciate a response.

Thanks

@ghost
Copy link

ghost commented Apr 29, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators Apr 29, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants