Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cannot enable aws rds performance insights on existing rds/postgres instance #9399

Closed
ubdb opened this issue Jul 18, 2019 · 12 comments · Fixed by #9745
Closed

cannot enable aws rds performance insights on existing rds/postgres instance #9399

ubdb opened this issue Jul 18, 2019 · 12 comments · Fixed by #9745
Labels
bug Addresses a defect in current functionality. service/rds Issues and PRs that pertain to the rds service.
Milestone

Comments

@ubdb
Copy link

ubdb commented Jul 18, 2019

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform Version

Terraform v0.11.14

Affected Resource(s)

    • provider.aws v2.19.0

Terraform Configuration Files

resource "aws_db_parameter_group" "wasa" {
  name        = "wasa-${var.cluster}-${terraform.workspace}"
  description = "parameter group for wasa database"
  family      = "postgres10"

  parameter = [
    { name = "log_lock_waits", value = true },
    { name = "log_min_duration_statement", value = 1000 },
    { name = "max_wal_senders", value = 15, apply_method = "pending-reboot" }, 
    { name = "log_connections", value = 0 }, 
  ]

  tags {
    ManagedBy            = "Terraform. Do not touch."
    database-component   = "wasa-backend"
    kubernetes-cluster   = "${var.cluster}"
    terraform-workspace  = "${terraform.workspace}"
    kubernetes-namespace = "${terraform.workspace}"
  }
}

resource "aws_db_instance" "wasa" {
  identifier                 = "wasa-${var.cluster}-${terraform.workspace}"
  allocated_storage          = "10"
  storage_type               = "${var.rds_storage_type[terraform.workspace]}"
  engine                     = "postgres"
  engine_version             = "${var.workspace_to_engine_version_map[terraform.workspace]}"
  instance_class             = "${var.instance_class_4_wasa_rds[terraform.workspace]}"
  name                       = "postgres"
  username                   = "postgres"
  password                   = "${var.wasa_db_password}"
  db_subnet_group_name       = "${var.workspace_to_db_subnet_group_name_map[terraform.workspace]}"
  backup_retention_period    = "${var.wasa_backup_retention_period}"
  backup_window              = "01:00-01:30"
  maintenance_window         = "wed:02:30-wed:03:30"
  performance_insights_enabled = true
  performance_insights_retention_period = 7
  skip_final_snapshot        = true                                                                # used for being able to destroy
  vpc_security_group_ids     = ["${var.rds_vpc_security_group_ids[terraform.workspace]}"]
  auto_minor_version_upgrade = true
  deletion_protection        = false
  multi_az                   = false
  parameter_group_name       = "${aws_db_parameter_group.wasa.name}"

  # only works from inside aws
  # coded for gitlab-ci
  provisioner "local-exec" {
    command = "sleep 10 && scripts/wasa.sh"

    environment = {
      PGENDPOINT = "${aws_db_instance.wasa.endpoint}"
      PGUSER     = "${aws_db_instance.wasa.username}"
      PGPASSWORD = "${aws_db_instance.wasa.password}"
    }
  }

  tags {
    ManagedBy            = "Terraform. Do not touch."
    database-component   = "wasa-backend"
    kubernetes-cluster   = "${var.cluster}"
    terraform-workspace  = "${terraform.workspace}"
    kubernetes-namespace = "${terraform.workspace}"
  }
}

Debug Output

https://gist.github.com/ubdb/6e8aa7c8e68872fb1535054062d228e6

Panic Output

None

Expected Behavior

Terraform should enable rds performance insights
Terraform should exit with an error, when something doesn't work.

Actual Behavior

Terraform does not apply the changes, as AWS returns a HTTP Status Code 500.
Terraform tries to apply the changes endless. Tt doesn't seem to handle error found incorrectly

Steps to Reproduce

create an rds instance without specifying the parameters.

  performance_insights_enabled = true
  performance_insights_retention_period = 7
  1. add the two parameters to the terraform code
  2. terraform apply

Important Factoids

none

References

None

@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label Jul 18, 2019
@Haegin
Copy link
Contributor

Haegin commented Jul 23, 2019

Does specifying the performance_insights_kms_key_id fix the issue?

@ubdb
Copy link
Author

ubdb commented Jul 29, 2019

Hi Haegin,

actually not. But I'm pretty sure there were some permissions missing.
with my personal account I first got 500er errors on aws web console and it worked there after assigning all kms related permissions.

However - terraform tries endlessly to apply these changes and doesn't seem to care about the 500er error code. This is definitely a bug.

After generating a kms key with terraform and using the corresponding id for that key, I get another error:
Error: Error creating DB Instance: InvalidParameterCombination: To enable encryption at rest StorageEncrypted must be set to 'true'

I currently don't use encrypted storage.
In the web gui I can enable performance insight without using encrypted storage.

Do you have any ideas how to achieve this with terraform or is this another bug?

Best Regards,
Uwe

Below you find the corresponding debug log output:

2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 2019/07/29 09:12:19 [DEBUG] DB Instance create configuration: {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   AllocatedStorage: 10,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   AutoMinorVersionUpgrade: true,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   BackupRetentionPeriod: 7,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   CopyTagsToSnapshot: false,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DBInstanceClass: "db.t2.micro",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DBInstanceIdentifier: "wasa-devcluster-sandbox",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DBName: "postgres",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DBParameterGroupName: "wasa-devcluster-sandbox",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DBSubnetGroupName: "default-vpc-xxxxxxxxx",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   DeletionProtection: false,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   EnablePerformanceInsights: true,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   Engine: "postgres",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   EngineVersion: "10.6",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   KmsKeyId: "arn:aws:kms:eu-central-1:xxxxxxxxxxxxxxxx:key/c878ebfb-476a-4c8f-8f4d-f8a6b72480d0",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   MasterUserPassword: "xxxxxxxxxxxxxxxxxxx",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   MasterUsername: "postgres",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   PerformanceInsightsRetentionPeriod: 7,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   PreferredBackupWindow: "01:00-01:30",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   PreferredMaintenanceWindow: "wed:02:30-wed:03:30",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   PubliclyAccessible: false,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   StorageEncrypted: false,
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   StorageType: "standard",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   Tags: [
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Key: "kubernetes-namespace",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Value: "sandbox"
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     },
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Key: "database-component",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Value: "wasa-backend"
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     },
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Key: "terraform-workspace",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Value: "sandbox"
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     },
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Key: "ManagedBy",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Value: "Terraform. Do not touch."
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     },
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     {
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Key: "kubernetes-cluster",
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:       Value: "devcluster"
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     }
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   ],
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   VpcSecurityGroupIds: ["sg-xxxxxxxx"]
2019-07-29T09:12:19.199+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: }




2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 2019/07/29 09:12:19 [DEBUG] [aws-sdk-go] DEBUG: Response rds/CreateDBInstance Details:
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: ---[ RESPONSE ]--------------------------------------
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: HTTP/1.1 400 Bad Request
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: Connection: close
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: Content-Length: 325
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: Content-Type: text/xml
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: Date: Mon, 29 Jul 2019 07:12:19 GMT
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: X-Amzn-Requestid: b9d285e2-a164-4d83-9016-d2e872a94cbb
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: -----------------------------------------------------
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 2019/07/29 09:12:19 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="http://rds.amazonaws.com/doc/2014-10-31/">
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   <Error>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     <Type>Sender</Type>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     <Code>InvalidParameterCombination</Code>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:     <Message>To enable encryption at rest StorageEncrypted must be set to 'true'</Message>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   </Error>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4:   <RequestId>b9d285e2-a164-4d83-9016-d2e872a94cbb</RequestId>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: </ErrorResponse>
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 2019/07/29 09:12:19 [DEBUG] [aws-sdk-go] DEBUG: Validate Response rds/CreateDBInstance failed, attempt 0/25, error InvalidParameterCombination: To enable encryption at rest StorageEncrypted must be set to 'true'
2019-07-29T09:12:19.342+0200 [DEBUG] plugin.terraform-provider-aws_v2.21.0_x4: 	status code: 400, request id: b9d285e2-a164-4d83-9016-d2e872a94cbb
2019/07/29 09:12:19 [DEBUG] aws_db_instance.wasa[0]: apply errored, but we're indicating that via the Error pointer rather than returning it: Error creating DB Instance: InvalidParameterCombination: To enable encryption at rest StorageEncrypted must be set to 'true'
	status code: 400, request id: b9d285e2-a164-4d83-9016-d2e872a94cbb

@Haegin
Copy link
Contributor

Haegin commented Jul 29, 2019

Ah I was running into a similar problem but I was using encrypted storage. Terraform would fail to enable performance insights and there is no way to specify the kms key for performance insights on the Terraform AWS module I'm using but enabling it in the web console then running terraform apply updated the state and fixed the problem for me. Good luck!

@ubdb
Copy link
Author

ubdb commented Jul 30, 2019

damn, I need to handle almost 200 database servers. But thanks for your response

@ubdb
Copy link
Author

ubdb commented Jul 30, 2019

no luck at all.
I have to handle about 200 database servers. And most of them have instance class db.t2.micro. Here I get the error: Error creating DB Instance: InvalidParameterCombination: DB Instance class db.t2.micro does not support encryption at rest

@ryancalhoun
Copy link

I had the same issue, and had to fork the module source, and specify both performance_insights_kms_key_id and performance_insights_retention_period to get the apply to succeed. Without the retention period, I got an invalid parameter error. Without the kms key, terraform just hung without making any changes or modifying the state.

@aeschright aeschright added the service/rds Issues and PRs that pertain to the rds service. label Aug 2, 2019
@ubdb
Copy link
Author

ubdb commented Aug 5, 2019

cool. what did you change in the forked code?
I'm using in my request both performance_insights_kms_key_id and performance_insights_retention_period-

@ryancalhoun
Copy link

@ubdb The pull request is linked above, number 157. The files diff is here https://github.com/terraform-aws-modules/terraform-aws-rds/pull/157/files.

I had to add both kms key and retention period to get the terraform apply to work.

@bflad bflad added bug Addresses a defect in current functionality. and removed needs-triage Waiting for first response or review from a maintainer. labels Aug 12, 2019
@bflad
Copy link
Contributor

bflad commented Aug 13, 2019

Fix submitted for the resource: #9745

bflad added a commit that referenced this issue Aug 13, 2019
…n update if configured

Reference: #8792
Reference: #9399
Reference: #9406

Previously before code update:

```
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsRetentionPeriod (667.32s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_EnabledToDisabled (733.03s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsKmsKeyId (862.56s)
--- FAIL: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_DisabledToEnabled (5686.66s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error modifying DB Instance tf-acc-test-5551941564373291595: InternalFailure:
        	status code: 500, request id: 9ad8b0ff-c5a2-43d0-a531-60aa047b8570
```

Output from acceptance testing:

```
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_EnabledToDisabled (680.88s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_DisabledToEnabled (680.95s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsRetentionPeriod (685.18s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsKmsKeyId (851.11s)
```
@bflad bflad added this to the v2.24.0 milestone Aug 14, 2019
@bflad
Copy link
Contributor

bflad commented Aug 14, 2019

The fix for this has been merged and will release with version 2.24.0 of the Terraform AWS Provider, tomorrow. 👍

@ghost
Copy link

ghost commented Aug 15, 2019

This has been released in version 2.24.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks!

paulrigor added a commit to paulrigor/terraform-provider-aws that referenced this issue Sep 6, 2019
* provider: Ensure needs-triage issue labeling step in GitHub Actions v2 is conditional on opened action

The payload is slightly different in v2, so actions/github@v1.0.0 fails with the action flag and does not return a neutral status. Instead, we will pre-filter the step via if.

References:

- https://help.github.com/en/articles/workflow-syntax-for-github-actions#jobsjob_idif
- https://github.com/actions/github/blob/4f0213ed102c4b518a7ce8bc4e6268bdd710770e/entrypoint.js#L73-L85

* resource/aws_lb_target_group_attachment: Prevent potential panic and update test function names for codebase conventions

Output from acceptance testing:

```
--- PASS: TestAccAWSLBTargetGroupAttachment_lambda (31.23s)
--- PASS: TestAccAWSLBTargetGroupAttachment_disappears (91.09s)
--- PASS: TestAccAWSLBTargetGroupAttachment_ipAddress (102.80s)
--- PASS: TestAccAWSLBTargetGroupAttachment_basic (103.02s)
--- PASS: TestAccAWSLBTargetGroupAttachment_withoutPort (123.06s)
--- PASS: TestAccAWSLBTargetGroupAttachment_BackwardsCompatibility (123.37s)
```

* Update CHANGELOG for hashicorp#9610

* Added CW log export value for aurora-postgresql

* tests/resource/aws_rds_cluster_instance: Ensure covering acceptance tests for performance_insights_enabled on Aurora MySQL 1/2 and Postgresql

Reference: hashicorp#9227
Reference: hashicorp#9635

Output from acceptance testing:

```
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql1 (629.12s)
--- PASS: TestAccAWSRDSClusterInstance_namePrefix (677.80s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql2 (679.39s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraPostgresql (680.27s)
--- PASS: TestAccAWSRDSClusterInstance_CopyTagsToSnapshot (699.01s)
--- PASS: TestAccAWSRDSClusterInstance_generatedName (712.49s)
--- PASS: TestAccAWSRDSClusterInstance_az (722.51s)
--- PASS: TestAccAWSRDSClusterInstance_disappears (763.18s)
--- PASS: TestAccAWSRDSClusterInstance_withInstanceEnhancedMonitor (873.08s)
--- PASS: TestAccAWSRDSClusterInstance_kmsKey (1062.91s)
--- PASS: TestAccAWSRDSClusterInstance_PubliclyAccessible (1247.95s)
--- PASS: TestAccAWSRDSClusterInstance_basic (1423.02s)
```

* Update CHANGELOG for hashicorp#9635

* resource/aws_db_instance: Only send performance_insights_kms_key_id on update if configured

Reference: hashicorp#8792
Reference: hashicorp#9399
Reference: hashicorp#9406

Previously before code update:

```
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsRetentionPeriod (667.32s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_EnabledToDisabled (733.03s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsKmsKeyId (862.56s)
--- FAIL: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_DisabledToEnabled (5686.66s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error modifying DB Instance tf-acc-test-5551941564373291595: InternalFailure:
        	status code: 500, request id: 9ad8b0ff-c5a2-43d0-a531-60aa047b8570
```

Output from acceptance testing:

```
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_EnabledToDisabled (680.88s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsEnabled_DisabledToEnabled (680.95s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsRetentionPeriod (685.18s)
--- PASS: TestAccAWSRDSDBInstance_PerformanceInsightsKmsKeyId (851.11s)
```

* resource/aws_rds_cluster_instance: Ensure performance_insights_kms_key_id updates include performance_insights_enabled

Reference: hashicorp#3015

This update ensures the correct RDS API error is shown when attempting to modify the Performance Insights KMS Key ID (we use `ExpectError` in the testing so this passes):

```
--- FAIL: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_DefaultKeyToCustomKey (691.76s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error modifying DB Instance tf-acc-test-2133090011528324987: InvalidParameterCombination: You cannot change your Performance Insights KMS key
```

Previously before code update:

```
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql2 (587.54s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql1 (594.85s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_CustomKey (660.70s)
--- FAIL: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_DefaultKeyToCustomKey (667.49s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error modifying DB Instance tf-acc-test-4757962708939555369: InvalidParameterCombination: Can not set PerformanceInsightsKMSKeyId without EnablePerformanceInsights
        	status code: 400, request id: c64b9f56-1b56-420c-9575-c5cfed87270b

          on /var/folders/v0/_d108fkx1pbbg4_sh864_7740000gn/T/tf-test833219777/main.tf line 15:
          (source code not available)

--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraPostgresql (699.46s)
```

Output from acceptance testing:

```
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_AuroraMysql2_DefaultKeyToCustomKey (630.56s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql1 (649.52s)
--- PASS: TestAccAWSRDSClusterInstance_generatedName (651.77s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_AuroraMysql1_DefaultKeyToCustomKey (652.94s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraPostgresql (670.18s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_CustomKey (671.61s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsKmsKeyId_AuroraPostgresql_DefaultKeyToCustomKey (672.19s)
--- PASS: TestAccAWSRDSClusterInstance_PubliclyAccessible (683.28s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql2 (690.78s)
--- PASS: TestAccAWSRDSClusterInstance_disappears (730.05s)
--- PASS: TestAccAWSRDSClusterInstance_CopyTagsToSnapshot (732.08s)
--- PASS: TestAccAWSRDSClusterInstance_az (747.28s)
--- PASS: TestAccAWSRDSClusterInstance_namePrefix (764.03s)
--- PASS: TestAccAWSRDSClusterInstance_kmsKey (792.98s)
--- PASS: TestAccAWSRDSClusterInstance_withInstanceEnhancedMonitor (822.65s)
--- PASS: TestAccAWSRDSClusterInstance_basic (1516.75s)
```

* resource/aws_db_instance: Ensure monitoring attributes are always written to state and retry ModifyDBInstance on IAM eventual consistency error

References:

- hashicorp#315
- hashicorp#2188
- hashicorp#5559

Previously before code updates:

```
--- FAIL: TestAccAWSDBInstance_MonitoringRoleArn_RemovedToEnabled (430.95s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error modifying DB Instance tf-acc-test-1165998526456666486: InvalidParameterValue: IAM role ARN value is invalid or does not include the required permissions for: ENHANCED_MONITORING
        	status code: 400, request id: 524f599d-3870-48b3-843e-28885ae3f75c

          on /var/folders/v0/_d108fkx1pbbg4_sh864_7740000gn/T/tf-test908490254/main.tf line 29:
          (source code not available)

--- PASS: TestAccAWSDBInstance_MonitoringRoleInterval (565.47s)
--- PASS: TestAccAWSDBInstance_MonitoringRoleArn_EnabledToDisabled (593.87s)
--- PASS: TestAccAWSDBInstance_MonitoringRoleArn_EnabledToRemoved (626.12s)
```

Output from acceptance testing:

```
--- PASS: TestAccAWSDBInstance_MonitoringRoleArn_EnabledToDisabled (587.93s)
--- PASS: TestAccAWSDBInstance_MonitoringRoleArn_RemovedToEnabled (614.89s)
--- PASS: TestAccAWSDBInstance_MonitoringRoleArn_EnabledToRemoved (656.13s)
--- PASS: TestAccAWSDBInstance_MonitoringRoleInterval (702.57s)
```

* tests/resource/aws_db_instance: Ensure monitoring_interval testing covers disabling and re-enabling

Output from acceptance testing:

```
--- PASS: TestAccAWSDBInstance_MonitoringInterval (978.85s)
```

* resource/aws_rds_cluster_instance: Ensure monitoring attributes are always written to state

Reference: hashicorp#315

Output from acceptance testing:

```
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql2 (588.69s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraMysql1 (640.98s)
--- PASS: TestAccAWSRDSClusterInstance_PerformanceInsightsEnabled_AuroraPostgresql (661.39s)
--- PASS: TestAccAWSRDSClusterInstance_namePrefix (674.32s)
--- PASS: TestAccAWSRDSClusterInstance_CopyTagsToSnapshot (703.51s)
--- PASS: TestAccAWSRDSClusterInstance_PubliclyAccessible (714.73s)
--- PASS: TestAccAWSRDSClusterInstance_disappears (735.39s)
--- PASS: TestAccAWSRDSClusterInstance_generatedName (774.99s)
--- PASS: TestAccAWSRDSClusterInstance_MonitoringRoleArn_EnabledToRemoved (834.26s)
--- PASS: TestAccAWSRDSClusterInstance_MonitoringRoleArn_RemovedToEnabled (876.44s)
--- PASS: TestAccAWSRDSClusterInstance_az (877.93s)
--- PASS: TestAccAWSRDSClusterInstance_MonitoringRoleArn_EnabledToDisabled (912.63s)
--- PASS: TestAccAWSRDSClusterInstance_MonitoringInterval (1037.61s)
--- PASS: TestAccAWSRDSClusterInstance_kmsKey (1205.30s)
--- PASS: TestAccAWSRDSClusterInstance_basic (1301.24s)
```

* Update CHANGELOG.md

* Final retries for gamelift resources

* Final retry after timeout creating gluecrawler

* Final guard duty retry

* r/ram_resource_share_accepter: New resource

* Add arguments, delete to disassociate

* Update module aws/aws-sdk-go to v1.23.0

* New Resources: aws_fsx_lustre_file_system and aws_fsx_windows_file_system

Reference: hashicorp#7035
Reference: hashicorp#7074

Builds on hashicorp#7074 with the following changes:

- Split into two separate resources (`aws_fsx_lustre_file_system` and `aws_fsx_windows_file_system`) to simplify practitioner configuration (e.g. lose the required configuration blocks), ease maintenance for resource logic and single file system arguments (e.g. `kms_key_id` only for Windows), and enhance validations (e.g. `storage_capacity` differences between file systems)
- Add covering acceptance testing with updates/force new for all arguments
- Better alignment with API naming for some arguments (e.g. changing `capacity` into `storage_capacity` to remove ambiguity with `throughput_capacity`)
- Implement [resource Customizable Timeouts](https://www.terraform.io/docs/extend/resources/retries-and-customizable-timeouts.html)
- Implement `skip_final_backup` argument for Windows
- Implement `network_interface_ids`, `owner_id`, and `vpc_id` attributes
- Augment resource documentation with additional notes found in [API reference](https://docs.aws.amazon.com/fsx/latest/APIReference/) and clarify `security_group_ids` import behavior

Output from acceptance testing:

```
--- PASS: TestAccAWSFsxLustreFileSystem_Tags (458.62s)
--- PASS: TestAccAWSFsxLustreFileSystem_basic (526.79s)
--- PASS: TestAccAWSFsxLustreFileSystem_disappears (564.58s)
--- PASS: TestAccAWSFsxLustreFileSystem_WeeklyMaintenanceStartTime (697.83s)
--- PASS: TestAccAWSFsxLustreFileSystem_StorageCapacity (940.13s)
--- PASS: TestAccAWSFsxLustreFileSystem_SecurityGroupIds (1074.08s)
--- PASS: TestAccAWSFsxLustreFileSystem_ImportedFileChunkSize (1276.18s)
--- PASS: TestAccAWSFsxLustreFileSystem_ImportPath (1322.13s)
--- PASS: TestAccAWSFsxLustreFileSystem_ExportPath (1338.75s)

--- PASS: TestAccAWSFsxWindowsFileSystem_Tags (2256.64s)
--- PASS: TestAccAWSFsxWindowsFileSystem_WeeklyMaintenanceStartTime (2346.44s)
--- PASS: TestAccAWSFsxWindowsFileSystem_basic (2404.35s)
--- PASS: TestAccAWSFsxWindowsFileSystem_disappears (2412.10s)
--- PASS: TestAccAWSFsxWindowsFileSystem_AutomaticBackupRetentionDays (2514.61s)
--- PASS: TestAccAWSFsxWindowsFileSystem_DailyAutomaticBackupStartTime (2849.43s)
--- PASS: TestAccAWSFsxWindowsFileSystem_SelfManagedActiveDirectory (2850.64s)
--- PASS: TestAccAWSFsxWindowsFileSystem_ThroughputCapacity (3292.44s)
--- PASS: TestAccAWSFsxWindowsFileSystem_SecurityGroupIds (3609.37s)
--- PASS: TestAccAWSFsxWindowsFileSystem_KmsKeyId (3977.10s)
--- PASS: TestAccAWSFsxWindowsFileSystem_StorageCapacity (4026.67s)
--- PASS: TestAccAWSFsxWindowsFileSystem_CopyTagsToBackups (4389.57s)
```

* Add docs

* Add acceptance test, remove comments, fix minor issue

* Adjust for better code

* Remove the invitation ARN as argument

* Update CHANGELOG.md

* Update website/docs/r/fsx_lustre_file_system.html.markdown

Co-Authored-By: Ryn Daniels <ryn@hashicorp.com>

* Add test sweepers for fsx filesystems

* Update CHANGELOG for hashicorp#7074 and hashicorp#9761

* Final retries for ELB resources

* Final retries for IAM resources

* Final retry after timeout deleting inspector assessment target

* Add AWS Lake Formation service client.
Run 'go mod tidy'.

* Update CHANGELOG for hashicorp#9745

* resource/aws_ram_resource_share_accepter: Minor adjustments and documentation enhancements for initial release

Reference: hashicorp#8259

Output from acceptance testing:

```
--- PASS: TestAccAwsRamResourceShareAccepter_basic (31.57s)
```

* Update CHANGELOG for hashicorp#8259

* provider: Remove Route 53 endpoint workaround in AWS GovCloud (US)

The endpoint information is now correctly included in the AWS Go SDK as of [v1.22.3](aws/aws-sdk-go@1f4898f). The AWS China endpoint information for Route 53 is still not present in the AWS Go SDK.

Output from acceptance testing in AWS GovCloud (US):

```
--- PASS: TestAccAWSRoute53Zone_VPC_Single (66.92s)
--- PASS: TestAccAWSRoute53Zone_VPC_Multiple (96.71s)
--- PASS: TestAccAWSRoute53Zone_VPC_Updates (173.89s)
```

* resource/aws_ram_resource_share_accepter: go fmt

* Final retries after internet gateway timeouts

* Final retry deleting iot types

* Final retry after timeout creating launch config

* tests/data-source/aws_organizations_organization: Add Organizations PreCheck

For consistency with other Organizations testing and to prevent the following failure:

```
       --- FAIL: TestAccAWSOrganizations/Organization/DataSource (3.55s)
            testing.go:568: Step 0 error: errors during apply:

                Error: Error creating organization: AlreadyInOrganizationException: The AWS account is already a member of an organization.
```

Acceptance testing from Organizations member account:

```
        --- SKIP: TestAccAWSOrganizations/Organization/DataSource (1.57s)
            provider_test.go:247: skipping tests; this AWS account must not be an existing member of an AWS Organization
```

Acceptance testing from standalone account:

```
        --- PASS: TestAccAWSOrganizations/Organization/DataSource (29.70s)
```

* Final retries for LB resources

* v2.24.0

* Cleanup after v2.24.0 release

* Update CHANGELOG for hashicorp#9747

* Update CHANGELOG for hashicorp#9748

* Update CHANGELOG for hashicorp#9740

* initial commit

* changes based on feedback: DiffSuppresFunc instead of Computed + Updated Acceptance test

* go fmt

* resource/aws_cloudwatch_log_subscription_filter: Use Default with distribution attribute, refactor tests to ensure all arguments and Kinesis Data Firehose/Kinesis Stream destinations are tested

Reference: https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/SubscriptionFilters.html

Output from acceptance testing (the test failure is a new bug discovery and will be fixed in a subsequent fix):

```
--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_basic (40.61s)
--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_disappears (41.09s)
--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_disappears_LogGroup (42.32s)
--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_Distribution (51.33s)
--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_DestinationArn_KinesisStream (108.80s)
--- FAIL: TestAccAWSCloudwatchLogSubscriptionFilter_RoleArn (114.10s)
    testing.go:568: Step 2 error: errors during apply:

        Error: Error updating SubscriptionFilter (tf-acc-test-3057491702311743141) for LogGroup (tf-acc-test-3057491702311743141), message: "Could not deliver test message to specified Kinesis stream. Check if the given kinesis stream is in ACTIVE state.", code: "InvalidParameterException"

          on /var/folders/v0/_d108fkx1pbbg4_sh864_7740000gn/T/tf-test472807723/main.tf line 98:
          (source code not available)

--- PASS: TestAccAWSCloudwatchLogSubscriptionFilter_DestinationArn_KinesisDataFirehose (126.02s)
```

* Update CHANGELOG for hashicorp#9265

* Update CHANGELOG.md

* Final retries for msk cluster

* Add Personailze service

* Run `make fmt`

* Final retries for redshift resources

* Final retries for routes

* Final sagemaker retries

* Security group retries

* Update CHANGELOG.md

* tests/resource/aws_rds_cluster_instance: Fix minor typo in master_password arguments

Reference: https://github.com/terraform-providers/terraform-provider-aws/pull/9746/files#r314539776

* Update CHANGELOG for hashicorp#9710

* Update module terraform-providers/terraform-provider-tls to v2.1.0

* Final retries for SQS resources

* Final retry for transfer server

* Retries and retry removal for opsworks resources

* Fix retiring_principal argument name for aws_kms_grant resource

* Final retry for wafregional acl association

* Final tag retries

* `status` is not an attribute in the schema (hashicorp#9823)

See https://github.com/terraform-providers/terraform-provider-aws/blob/00909998d919faf5494ab8f6b38241deb1957d99/aws/resource_aws_docdb_cluster.go#L33

* resource/aws_kinesis_firehose_delivery_stream: Address PR hashicorp#9103 feedback

Reference: hashicorp#9103

Mainly reverting some of the changes to processing_configuration/error_output_prefix and adding DiffSuppressFunc to handle the processing_configuration configuration block attribute.

Output from acceptance testing:

```
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_ErrorOutputPrefix (151.81s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_missingProcessingConfiguration (158.88s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_OrcSerDe_Empty (168.93s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_ExternalUpdate (169.36s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_SplunkConfigUpdates (170.83s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3KinesisStreamSource (136.10s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Deserializer_Update (179.46s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3Updates (180.75s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_importBasic (187.90s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Enabled (190.90s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_ParquetSerDe_Empty (192.30s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Serializer_Update (196.54s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3basic (200.98s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_OpenXJsonSerDe_Empty (202.37s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_HiveJsonSerDe_Empty (222.59s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3KmsKeyArn (226.21s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3WithCloudwatchLogging (189.02s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3basic (136.60s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3ConfigUpdates (303.77s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3basicWithTags (184.97s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_RedshiftConfigUpdates (808.04s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ElasticsearchConfigUpdates (970.67s)
```

* Update CHANGELOG for hashicorp#9103

* Update CHANGELOG for hashicorp#9442

* Update CHANGELOG.md

* Update aws/resource_aws_internet_gateway.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_msk_cluster.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_security_group.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_security_group.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_sqs_queue_policy.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_sqs_queue_policy.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update CHANGELOG.md

* Lint for the tautological linting gods

* Final ACL retries

* Update CHANGELOG.md

* WAF and wafregional token final retries (hashicorp#9826)

* update CHANGELOG for hashicorp#9826

* s3_bucket_object: Fix ETAG changes not forcing new

* Add default setting for aws_cloudwatch_event_target ecs_target's task_count (hashicorp#9773)

* Add default setting for aws_cloudwatch_event_target ecs_target's task_count.

* Remove forcenew from etag on s3_bucket_object

* Final retries for s3 timeouts

* Update CHANGELOG.md

* Update Changelog for hashicorp#9773

* Update db_instance.html.markdown

The description of `final_snapshot_identifier` doesn't feel correct to me.
When `skip_final_snapshot` is by default set to false and `final_snapshot_identifier`
is omitted, the provider errored with 
> RDS Cluster FinalSnapshotIdentifier is required when a final snapshot is require

Related: hashicorp#4910

* v2.25.0

* Cleanup after v2.25.0 release

* Fixes EC2 capacity reservation in state not found

* Support Kinesis Data Firehose server-side encryption.

* Update aws/resource_aws_kinesis_firehose_delivery_stream.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_kinesis_firehose_delivery_stream.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Update aws/resource_aws_kinesis_firehose_delivery_stream.go

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* Run 'make fmt'.

* Review: Remove customizable timeouts.

* Review: Replace 'CustomizeDiff' with 'DiffSuppressFunc'.

* Review: Revert to separate 'waiter' functions.

* Review: Separate test configurations for SSE.

* Comment out r/aws_kinesis_firehose_delivery_stream acceptance tests that fail.

* Add AWS Amplify service client.

* Add Amazon AppStream service client.

* Use isAWSErr in EC2 Capacity Reservation read

* Update CHANGELOG.md

* Adding an ElasticsearchDomain data source to the aws provider

* Added VPC Options to ElasticsearchDomain datasource

* Aligning elasticsearch datasource attributes to resource attributes

* Adding an extra test case with an advanced domain configuration

* Documented the additional attributes

* Adding link to aws_elasticsearch_domain datasource docs page

* feedback from review and corrections to make test pass

* removed log_type check because there seems to be odd behaviour with the resource

* changing zone_awareness_config type to TypeList

* documented the zone_awareness_config attribute in the cluster_config block

* Import testing for vpn gateway

* Added IoT Analytics Service

* Update CHANGELOG.md

* Add AWS IoTEvents service

* Update docs with iotevents service

* Update erb and order attributes in documentation

* Import test refactors for vpc resources

* Multiple load_balancer blocks

Add a note that multiple load_balancer blocks are supported with minimum aws provider. This wasn't clear and was only through seeing an old issue that it was possible. With recent support for multiple target groups for ecs service, I think this will be something people will try and use more.

* update CHANGELOG for hashicorp#1867

* Update module aws/aws-sdk-go to v1.23.12

* v2.26.0

* Cleanup after v2.26.0 release

* r/aws_s3_bucket: Include any system tags that Terraform ignores when setting S3 bucket tags (hashicorp#7342)

* Update Changelog for hashicorp#7342

* Update website/docs/r/ecs_service.html.markdown

Co-Authored-By: Brian Flad <bflad417@gmail.com>

* resource/aws_kinesis_firehose_delivery_stream: Remove Computed from server_side_encryption attribute

So Terraform always performs drift detection.

Output from acceptance testing:

```
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ElasticsearchConfigUpdates (708.34s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Deserializer_Update (204.92s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Enabled (188.93s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_HiveJsonSerDe_Empty (166.30s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_OpenXJsonSerDe_Empty (154.77s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_OrcSerDe_Empty (180.87s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_ParquetSerDe_Empty (165.68s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_DataFormatConversionConfiguration_Serializer_Update (152.61s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_ErrorOutputPrefix (177.03s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3_ExternalUpdate (152.21s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3basic (162.62s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3KmsKeyArn (225.11s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_ExtendedS3Updates (157.35s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_importBasic (130.87s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_missingProcessingConfiguration (199.02s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_RedshiftConfigUpdates (714.21s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3basic (114.90s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3basicWithSSE (372.95s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3basicWithTags (194.45s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3ConfigUpdates (287.14s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3KinesisStreamSource (136.86s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_s3WithCloudwatchLogging (122.61s)
--- PASS: TestAccAWSKinesisFirehoseDeliveryStream_SplunkConfigUpdates (195.68s)
```

* Add iotevents service to endpointServiceNames

* deps: github.com/aws/aws-sdk-go/service/appstream@v1.23.12

* Update CHANGELOG for hashicorp#6523

* Remove duplicate nested lists for Global Accelerator resources

* remove status attribute from docdb_cluster_instance doc (hashicorp#9921)

* tests/service/s3: Check S3 Bucket location before attempting other S3 operations in sweepers

To prevent errors in the sweepers such as:

```
2019/08/30 12:23:14 [ERR] error running (aws_s3_bucket_object): error listing S3 Bucket (tf-acc-test-6376821381526517605) Objects: AccessDenied: Access Denied
```

And

```
2019/08/30 11:38:01 [INFO] Skipping S3 Bucket (tf-test-bucket-destination-2585329347318042546): AuthorizationHeaderMalformed: The authorization header is malformed; the region 'us-east-1' is wrong; expecting 'eu-west-1'
```

Output from sweeper:

```console
$ go test ./aws -v -sweep=us-east-1,us-west-2 -sweep-run=aws_s3_bucket -timeout 10h
...
2019/08/30 12:01:08 Sweeper Tests ran:
	- aws_s3_bucket_object
	- aws_s3_bucket
```

* Update module aws/aws-sdk-go to v1.23.13

* Update module hashicorp/terraform to v0.12.7

* resource/ecs_cluster: Add ability to enable ECS Cluster Insights

Fixes: hashicorp#9294

* Fix test names and ignore broken import

* Import test refactor for subnets

* Add the service name in the list of customizable endpoints

* Import acceptance test refactor for SSM resources

* Acceptance test import refactor for SQS queue policy

* Acceptance test import refactor for simpledb domain

* Acceptance test import refactor for SFN activity

* Acceptance test import refactor for SES template

* Acceptance test import refactor for service resources

* service/cloudhsmv2: Implement sweeper

To prevent sweeper errors such as:

```
2019/09/04 02:12:15 [ERR] error running (aws_vpc): Error deleting Subnet (subnet-064c5a7cad5a28b9e): DependencyViolation: The subnet 'subnet-064c5a7cad5a28b9e' has dependencies and cannot be deleted.
```

Output from sweeper in AWS Commercial:

```console
$ go test ./aws -v -sweep=us-east-1,us-west-2 -sweep-run=aws_cloudhsm_v2_cluster -timeout 10h
2019/09/04 10:27:24 [DEBUG] Running Sweepers for region (us-east-1):
...
2019/09/04 10:27:25 [INFO] Deleting CloudHSMv2 Cluster (cluster-wporekks46b) HSM: hsm-y4tvi5ukedh
...
2019/09/04 10:29:06 [INFO] Deleting CloudHSMv2 Cluster: cluster-wporekks46b
...
2019/09/04 10:30:57 Sweeper Tests ran:
  - aws_cloudhsm_v2_cluster
2019/09/04 10:30:57 [DEBUG] Running Sweepers for region (us-west-2):
...
2019/09/04 10:30:59 [INFO] Deleting CloudHSMv2 Cluster: cluster-w56d2uzszjf
...
2019/09/04 10:31:30 [INFO] Deleting CloudHSMv2 Cluster: cluster-zrvllautsay
...
2019/09/04 10:32:01 [INFO] Deleting CloudHSMv2 Cluster: cluster-chxrr77wb2v
...
2019/09/04 10:32:32 Sweeper Tests ran:
  - aws_cloudhsm_v2_cluster
```

Output from sweeper in AWS GovCloud (US):

```console
$ go test ./aws -v -sweep=us-gov-west-1 -sweep-run=aws_cloudhsm_v2_cluster -timeout 10h
2019/09/04 10:28:52 [DEBUG] Running Sweepers for region (us-gov-west-1):
...
2019/09/04 10:28:54 Sweeper Tests ran:
  - aws_cloudhsm_v2_cluster
```

Output from acceptance testing:

```
--- PASS: TestAccAWSCloudHsm2Cluster_basic (285.06s)

--- PASS: TestAccAWSCloudHsm2Hsm_basic (898.88s)
```

* service/ecs: Minor adjustments to finish cluster setting implementation

Output from acceptance testing:

```
--- PASS: TestAccAWSEcsCluster_disappears (9.90s)
--- PASS: TestAccAWSEcsCluster_basic (13.35s)
--- PASS: TestAccAWSEcsCluster_containerInsights (25.56s)
--- PASS: TestAccAWSEcsCluster_Tags (27.62s)

--- PASS: TestAccAWSEcsDataSource_ecsClusterContainerInsights (14.16s)
--- PASS: TestAccAWSEcsDataSource_ecsCluster (14.25s)
```

* Update CHANGELOG for hashicorp#9720

* deps: Update github.com/aws/aws-sdk-go@v1.23.15

Updated via:

```
$ go get github.com/aws/aws-sdk-go@v1.23.15
$ go mod tidy
$ go mod vendor
```

* Update CHANGELOG for hashicorp#9998

* Add created_add attribute to lightsail instance documentation

* Update website/docs/r/lightsail_instance.html.markdown

Co-Authored-By: Ryn Daniels <ryn@hashicorp.com>

* v2.27.0

* Cleanup after v2.27.0 release

* switch to terraform.NewResourceConfigRaw
@ghost
Copy link

ghost commented Nov 1, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Nov 1, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug Addresses a defect in current functionality. service/rds Issues and PRs that pertain to the rds service.
Projects
None yet
5 participants