-
Notifications
You must be signed in to change notification settings - Fork 9.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DependencyViolation on tainted AWS security group #2579
Comments
I think I'm also running into this. Renaming a security group that's tied to an instance. Terraform wants to delete the sg and re-created it, but can't because it's assigned to an instance. |
Yaa, I just noticed this when I tried to change the description of a SG (forces -/+...which seems kinda silly on amazon's part, but whatever). Putting a create_before_destroy in there doesn't help either because then you get a duplicate sg name error. |
Hello – There's a known limitation of Since this issue was opened, we've removed the I've fixed the docs in #4139 and will ship that out soon. I'm going to go ahead and close this for now; using Thanks! |
@catsby any chance to see a name_prefix for the SGs as well? |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Hey,
We're getting the error below when applying a plan with a tainted AWS security group resource:
The security group is used by a launch configuration which in turn is used by an auto scaling group; but even after tainting both resources, the SG failed to be destroyed.
Here're the relevant parts of the .tf file:
The text was updated successfully, but these errors were encountered: