-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provider produced inconsistent final plan - tags_all errors without using default_tags block #18366
Comments
Similar(ish): |
We're experiencing this problem in a scenario where the value of resource tags is fetched from a resource "aws_ssm_parameter" "is_core_deployed" {
...
}
data "null_data_source" "tags" {
inputs = {
tags = jsonencode(aws_ssm_parameter.is_core_deployed.tags)
}
depends_on = [
aws_ssm_parameter.is_core_deployed
]
}
resource "aws_vpc" "this" {
...
tags = jsondecode(data.null_data_source.tags.outputs["tags"])
} This is a trick that allowed us (with terraform |
Hi @ogdowski , thank you for raising this issue. To clarify first, when you note that |
Hello @anGie44, thank you for working on this issue. We were adding just Like @mkielar said - we are suspecting that the reason of this might be dynamic tag values fetched from |
I've started refactoring this, and now I have this on an AutoScaling Group...
As you can see there's one tag that says Terraform fails to deploy this ASG with:
Versions:
|
This has been released in version 3.38.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
@anGie44 Looks like it's back in 3.38...
The SSM Parameter mentioned in the error is deployed like this:
The error only appears when we terraform updates already existing parameter. When we delete the resource first, and then let terraform create it from scratch, it works. Something is seriously wrong. We're still not using |
Using 3.37 made it work for us, so the problem is definitely in 3.38. Can you please reopen the ticket @ewbankkit @anGie44, or would you rather have me open a new one? IMO this is exactly the same issue as before, except on a new resource. |
Thank you for raising this issue again @mkielar! I'm able to reproduce and am seeing the this type of output on plan
In this case, I would of expected the |
Yes, I'm seeing a flare of errors, one for each tag. Just pasted one of them in the reopening comment for brevity, but there's more than just one. |
Interesting, so I've played around with that config more and it seems to actually be triggered by the |
This has been released in version 3.39.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform CLI and Terraform AWS Provider Version
Terraform v0.13.3
hashicorp/aws 3.33
hashicorp/aws 3.32
is working without issuesAffected Resource(s)
Terraform Configuration Files
We are using terraform-aws-vpc module in 2.77.0 version for our VPC resources
We are not using "default_tags" block in provider added in 3.33 release
Expected Behavior
terraform apply
should work without issuesActual Behavior
terraform apply
produces these kind of errors:...and more for other elements
Steps to Reproduce
terraform apply
The text was updated successfully, but these errors were encountered: