-
Notifications
You must be signed in to change notification settings - Fork 625
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloudflare_notification_policy alert_type=incident_alert & alert_type=maintenance_event_notification property missing #2882
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Thank you for reporting this issue! For maintainers to dig into issues it is required that all issues include the entirety of This issue has been marked with |
moving to an enhancement as this is not a regression of existing functionality. |
closed by #2901 |
Confirmation
Terraform and Cloudflare provider version
Terraform v1.5.7
on linux_amd64
Affected resource(s)
cloudflare_notification_policy
Terraform configuration files
Link to debug output
Pasted Below
Panic output
Initializing plugins and modules...
╷
│ Error: expected alert_type to be one of [access_custom_certificate_expiration_type advanced_ddos_attack_l4_alert advanced_ddos_attack_l7_alert bgp_hijack_notification billing_usage_alert block_notification_block_removed block_notification_new_block block_notification_review_rejected clickhouse_alert_fw_anomaly clickhouse_alert_fw_ent_anomaly custom_ssl_certificate_event_type dedicated_ssl_certificate_event_type dos_attack_l4 dos_attack_l7 expiring_service_token_alert failing_logpush_job_disabled_alert fbm_auto_advertisement fbm_dosd_attack fbm_volumetric_attack health_check_status_notification hostname_aop_custom_certificate_expiration_type http_alert_edge_error http_alert_origin_error load_balancing_health_alert load_balancing_pool_enablement_alert real_origin_monitoring scriptmonitor_alert_new_code_change_detections scriptmonitor_alert_new_hosts scriptmonitor_alert_new_malicious_hosts scriptmonitor_alert_new_malicious_scripts scriptmonitor_alert_new_malicious_url scriptmonitor_alert_new_max_length_resource_url scriptmonitor_alert_new_resources secondary_dns_all_primaries_failing secondary_dns_primaries_failing secondary_dns_zone_successfully_updated secondary_dns_zone_validation_warning sentinel_alert stream_live_notifications tunnel_health_event tunnel_update_event universal_ssl_event_type web_analytics_metrics_update weekly_account_overview workers_alert zone_aop_custom_certificate_expiration_type], got incident_alert
│
│ with cloudflare_notification_policy.notification_policy,
│ on notification.tf line 32, in resource "cloudflare_notification_policy" "notification_policy":
│ 32: alert_type = "incident_alert"
Expected output
To accept the alert_type = "incident_alert" or "maintenance_event_notification" which behaviour can be seen with the RESTAPI
{
"id": "REDACTED",
"name": "Cloudflare Status\t",
"description": "Incident Alert if Cloudflare is experiencing an incident",
"enabled": true,
"alert_type": "incident_alert",
"mechanisms": {
"webhooks": [
{
"name": "slack-channel",
"id": "REDACTED"
}
]
},
"created": "REDACTED",
"modified": "REDACTED",
"conditions": {},
"filters": {
"affected_components": null,
"incident_impact": null
}
},
{
"id": "REDACTED",
"name": "Cloudflare Maintenance Notifications",
"description": "",
"enabled": true,
"alert_type": "maintenance_event_notification",
Actual output
Error: expected alert_type to be one of [access_custom_certificate_expiration_type advanced_ddos_attack_l4_alert advanced_ddos_attack_l7_alert bgp_hijack_notification billing_usage_alert block_notification_block_removed block_notification_new_block block_notification_review_rejected clickhouse_alert_fw_anomaly clickhouse_alert_fw_ent_anomaly custom_ssl_certificate_event_type dedicated_ssl_certificate_event_type dos_attack_l4 dos_attack_l7 expiring_service_token_alert failing_logpush_job_disabled_alert fbm_auto_advertisement fbm_dosd_attack fbm_volumetric_attack health_check_status_notification hostname_aop_custom_certificate_expiration_type http_alert_edge_error http_alert_origin_error load_balancing_health_alert load_balancing_pool_enablement_alert real_origin_monitoring scriptmonitor_alert_new_code_change_detections scriptmonitor_alert_new_hosts scriptmonitor_alert_new_malicious_hosts scriptmonitor_alert_new_malicious_scripts scriptmonitor_alert_new_malicious_url scriptmonitor_alert_new_max_length_resource_url scriptmonitor_alert_new_resources secondary_dns_all_primaries_failing secondary_dns_primaries_failing secondary_dns_zone_successfully_updated secondary_dns_zone_validation_warning sentinel_alert stream_live_notifications tunnel_health_event tunnel_update_event universal_ssl_event_type web_analytics_metrics_update weekly_account_overview workers_alert zone_aop_custom_certificate_expiration_type], got incident_alert
│
│ with cloudflare_notification_policy.notification_policy,
│ on notification.tf line 32, in resource "cloudflare_notification_policy" "notification_policy":
│ 32: alert_type = "incident_alert"
│
╵
Operation failed: failed running terraform plan (exit 1)
Steps to reproduce
Additional factoids
No response
References
No response
The text was updated successfully, but these errors were encountered: