-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
resource/aws_cloudwatch_metric_alarm: Validate alarm actions #6151
resource/aws_cloudwatch_metric_alarm: Validate alarm actions #6151
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks @tkbky! 🚀
--- PASS: TestAccAWSCloudWatchMetricAlarm_missingStatistic (1.96s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_datapointsToAlarm (4.13s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_extendedStatistic (4.16s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_basic (4.26s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_importBasic (4.61s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_treatMissingData (6.98s)
--- PASS: TestAccAWSCloudWatchMetricAlarm_evaluateLowSampleCountPercentiles (7.35s)
This has been released in version 1.41.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
. we are using cloudwatch alarm for setting ec2 recovery and the validation for the alarm action is failing across the board. This has impaired our production instances with entire workspaces getting errored out. Please look into this. |
@prasanthsurapaneni please see #6203 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Fixes #6092
Changes proposed in this pull request:
alarm_actions
is a valid ARN.Output from acceptance testing: