-
Notifications
You must be signed in to change notification settings - Fork 159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pulumi tries to replace RDS instance even when no changes are made #2426
Comments
Hi @bothra90 - Thank you for opening this issue. I understand unexpected changes like this can be frustrating, and we'll be looking into this issue as soon as we can. Thank you. |
@kpitzen: FWIW, we see this on our cluster in |
Interesting - thank you for the extra context @bothra90 ! I was unable to reproduce the issue in With this program: """An AWS Python Pulumi program"""
import pulumi
from pulumi_aws import rds
# Create an AWS resource (S3 Bucket)
cluster = rds.Cluster(
'my-rds-cluster',
args=rds.ClusterArgs(
engine='aurora-mysql',
engine_version='5.7.mysql_aurora.2.07.1',
master_username="foo",
master_password="barbarbar",
)
)
# Export the name of the bucket
pulumi.export('cluster_id', cluster.id) Let me try the same program in |
@bothra90 Update: I've confirmed that the above program reproduces this issue in We'll be looking at this ASAP - appreciate your patience! |
That's awesome. Thanks, @kpitzen! |
I've also confirmed that running |
From my testing, it appears that this issue seems to only seems to affect the What's interesting is that
Workaround Solution:As this issue is isolated to the An example minimal Typescript code:
This should help unblock usage of Pulumi with aurora RDS instances in the |
Note: Downgrading from p1 since this issue only affects a single region, we have a workaround provided, and it appears to be an upstream API issue currently. |
I am seeing this in |
Seeing this exact behaviour in Edit: found the problem. I was only specifying 1 AZ in the cluster definition. It needs 3. |
What happened?
pulumi up
tried to replace our production RDS instance (Aurora MySQL) even though nothing changed on the surface. but Thankfully it failed becauseprotect
flag was set totrue
, but this could be a catastrophic failure.Expected Behavior
No updates
Steps to reproduce
I'm not sure how to reproduce this apart from trying to run pulumi up on a pre-existing aurora cluster. If such a cluster exists, just running
pulumi up
should lead to a repro. Our conclusion is that this is happening because Amazon is associatingaurora
as thestorageType
for these clusters and this leads pulumi to believe that it needs to recreate the instance. It's possible that AWS only started doing this recently (in the last 2-3 days).Output of
pulumi about
Additional context
No response
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: