-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
provider/aws: Support additional changes to security groups of instance without forcing new #5193
provider/aws: Support additional changes to security groups of instance without forcing new #5193
Conversation
…ce without forcing new
3ffb707
to
564dd36
Compare
I want to change |
This would be incredibly helpful. Never really understood why It destroys the instance just to change the security group. |
@innossh thanks so much for the PR. Currently running all the Instance tests to make sure all is well. Pending those going green, will merge :) |
|
…updates provider/aws: Support additional changes to security groups of instance without forcing new
Hey folks, so I'm a little concerned about this change in relation to behavior on EC2 Classic. There's some legacy in the upstream APIs we need to treat properly. So the
Now if you check out We just have It looks like the strategy here is to convert SG names into SG IDs and drop them into the Indeed, our nightly acceptance tests and my local testing reveal this test consistently failing:
I'd be happy to make this work more consistently if we can, but I think we need to double check the behavior in Classic environments before we release a change like this. |
@phinze I haven't noticed about classic environments. 😢 |
FYI, I noticed that while this PR got reverted, the changelog entry for this still exists in the changelog for 0.6.13: |
Hi @vitroth you are indeed correct - i will take care of that - thanks for pointing it out Paul |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
With this pull request,
security_groups
can now be updated without forcing a new instance.API reference for Modify Instance Attribute:
http://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifyInstanceAttribute.html
[description]
First apply the following sample config:
Next change the
security_groups
inaws_instance
:In this case,
terraform plan
results into:The instance will be destroyed when the re-creating is not necessary. 😞
But with this pull request, like this: