-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Destroying resources on AWS fails due to delays in dependency removal #276
Comments
Using 0.2.1 |
We should be waiting for the resources to clean up, but I'll take a look. You said instances are an issue. Any other specific cases? |
Some output:
On a second run, all the remaining resources get destroyed. |
Thanks, I'm working through this now. |
So the provider does wait until AWS is reporting that the instance is in the "terminated" state, so I'm just going to add retry logic to the EIP destroy. |
Fixed |
Awesome, that was fast. Thanks a lot! |
Destroying resources on AWS often fails due to delays in the removal of dependent resources.
For example, when removing security groups, terraform often fails because the dependent instances haven't yet been fully removed: even though terraform initiated the removal in correct order, the operation takes a while to complete.
Accordingly the second destroy run always completes successfully.
Same happens with other resources that depend on slow operations, eg vpcs or subnets.
The text was updated successfully, but these errors were encountered: