-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security group change of instance in VPC shouldn't require new resource #194
Comments
FYI: I also ran into this problem and sent a pull request to fix this. |
@tmtk75 I think you addressed ordering, but this is another issue which is that with VPCs, security group updates shouldn't require a new resource. |
@tmtk75 Yes your ordering fix does work, but I this is a different issue where nodes in VPC should not be destroyed if you change their security group membership. I should have clarified further. Thank you |
Hi, guys. |
I'm working on a branch on converting the |
Ordering has been fixed, now we have the update vs recreate issue. |
any update as this destroying instances on every security group change or addition isn't really viable for a lot of use cases |
I don't think it's being caused by a set issue. Or rather that issue is solved, this issue remains:
This should just remove the spurious SG since we're in VPC. |
This may be fixed with #1153 which looks promising but needs to be rebased on master |
It is fixed by #1153 (or at least, the trail starting there) |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Security group membership changes on VPC nodes should not be destructive.
To reproduce:
note: will open another issue in regards to the security group ordering.
The text was updated successfully, but these errors were encountered: