-
Notifications
You must be signed in to change notification settings - Fork 826
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update AKS terraform install template #2165
Update AKS terraform install template #2165
Conversation
* Set azurerm provider version to = 2.63.0 because it seems more stable to get existing security groups * Replace interpolation-only expressions in outputs
@dzmitry-lahoda |
* Set azurerm provider version to = 2.63.0 because it seems more stable to get existing security groups * Replace interpolation-only expressions in outputs * Ignore resource_group_name changes (random case Azure issue) in network security group rule
…gones into update-aks-tf-template
Build Succeeded 👏 Build Id: e1d1f7d5-757d-484e-a364-614571cb3824 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
Build Succeeded 👏 Build Id: fba99ff9-4166-4db2-9a75-5178ebf4d0e1 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
No issue with terraform 0.12.31 and Azurerm 2.63.0 (set in PR) from scratch (tested twice)
|
@dzmitry-lahoda let me know if this works for you and is good to merge 😄 looks like you two own the AKS experience now. |
…update-aks-tf-template
Build Succeeded 👏 Build Id: 75a61125-6829-4371-ae47-a6df139b6102 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
…update-aks-tf-template
Build Succeeded 👏 Build Id: 1f6a13e2-f280-4c00-9cb6-6ab96280d3e2 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
yep main branch doesn't lock to azurer provider 2.63.0 |
same as in master on first attempt. there is official issue for MS to allow access to background network. so in this case may be https://registry.terraform.io/providers/hashicorp/time/latest/docs/resources/sleep help running apply again. |
|
did it |
weird, i deployed twice from scratch with terraform 0.12.31 and azurerm 2.63.0 without any issue |
i can add a sleep resource but as it's random, i'm not sure how many seconds/minutes to wait |
30 seconds in |
I'm deploying a fresh new cluster without sleep with terraform 1.0.1 (instead of 0.12.31) and azurerm 2.63.0 |
2 tests without any issue with terraform 0.12.31 and azurerm 2.63.0
|
after waiting multiple minutes, datasource is still empty |
ok after more than 5 minutes |
|
…update-aks-tf-template
…gones into update-aks-tf-template
Build Succeeded 👏 Build Id: f2971b59-233e-4a60-ad44-1b14ba41e910 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
Hello again @dzmitry-lahoda , i pushed a new version with static network security group name (the one which match cluster dns_prefix agones) |
Build Succeeded 👏 Build Id: 8c62c3c9-682c-4be6-ad4e-6eae8f31ed25 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
Hello @dzmitry-lahoda, can you confirm (when you have time) the last commit of this pr branch is ok? thank you |
thanks, i am ok with:) hope it will be stable, may be add comment into name resource telling not to rename it:) OR hash it in TF:) |
thank you |
Hello @markmandel |
regarding our issue with azurerm_resources datasource updated after a while, i found this which explains it: there is a regional cache. That explains why i didn't have the issue the first time because i've deployed the cluster in an european location |
i confirm that datasource works fine when using the regional location as location for the AKS cluster.
no issue during cluster creation using azurerm_resources datasource. az cli also returns the security group just after terraform has finished. It took almost 20 minutes when i used eastus
|
so until to have a way to bypass the regional cache, the best option is not using datasource which this PR does |
👋🏻 just checking in, and scrolling past allll the comments 😄 this good to go, or we still playing with it? |
Good to go. I’ve have no solution for the regional cache so i can’t put back the azurerm_resources data source. |
…update-aks-tf-template
Build Succeeded 👏 Build Id: 954aa7a5-b714-47be-a62f-8775be40d974 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
@dzmitry-lahoda you happy too? In which case, we can land this before RC next week 👍🏻 |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: markmandel, WeetA34 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Build Succeeded 👏 Build Id: 15b9e7fd-200f-4dd5-9112-bfa3e655ddc5 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
What type of PR is this?
/kind bug
What this PR does / Why we need it:
During previous PR cleanup, the azurerm block has been removed but it's mandatory to define features
After finding in aks-engine sources how the dynamic part of node pool network security group names isdefined (based on hash of cluster dns_prefix), we can use a static group name to avoid random issue with azurerm_resources datasource which randomly returns an empty array
Azure randomly returns lowercased resource_group_name in network_security_group_rule resource. So, terraform plan/apply may want to re-create the network security group rule. To avoid that, an ignore_changes lifecycle block has been added.
Which issue(s) this PR fixes:
N/A
Special notes for your reviewer:
N/A