You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When setting delete_snapshots_on_destroy to true and then destroying a polaris_aws_cnp_account resource, all snapshots in the AWS account should be removed, before the account is removed from RSC.
Current Behavior
When used in a module or script that also creates the IAM role in the AWS account, Terraform will remove the IAM user before RSC completes the delete operation. This causes the delete operation to fail in RSC and for it to post an error. The error results in the polaris_aws_cnp_account resource not being deleted. After this, the AWS account must be manually removed from RSC via engineering. The snapshots in the AWS account must be manually removed by the customer.
Failure Information (for bugs)
Please help provide information about the failure if this is a bug.
Use verbose outputs to capture any debug information.
TBD
Steps to Reproduce
Add an AWS account to RSC via Terraform.
Be sure that the same Terraform module/script creates the IAM Role and creates the polaris_aws_cnp_account resource.
Ensure that the delete_snapshots_on_destroy option is set to true on the polaris_aws_cnp_account resource.
Perform several backups of EC2 instances in the AWS account.
S3 backups should work as well.
Once the backups are complete, remove the AWS account from RSC by running the appropriate terraform destory command.
Context
Version of project
beta.16
Version of dependencies.
N/A
Version of operating system.
N/A
Version of RSC
v20240304-17
Failure Logs
Use verbose outputs to capture any debug information.
TBD
The text was updated successfully, but these errors were encountered:
This is a problem with the RSC GraphQL API. To be able to create the roles we need the trust policies and to get the trust policies we need to start the account onboarding. The account onboarding starts with the polaris_aws_cnp_account resource. This is also the resource which, when removed, removes the snapshots (if delete_snapshots_on_destroy is set to true). So this is a dependency problem in the API. If we could get the trust policies before starting the account onboarding there would be no problem, because we could create the roles before starting to onboard the account.
Expected Behavior
When setting
delete_snapshots_on_destroy
totrue
and then destroying apolaris_aws_cnp_account
resource, all snapshots in the AWS account should be removed, before the account is removed from RSC.Current Behavior
When used in a module or script that also creates the IAM role in the AWS account, Terraform will remove the IAM user before RSC completes the delete operation. This causes the delete operation to fail in RSC and for it to post an error. The error results in the
polaris_aws_cnp_account
resource not being deleted. After this, the AWS account must be manually removed from RSC via engineering. The snapshots in the AWS account must be manually removed by the customer.Failure Information (for bugs)
Please help provide information about the failure if this is a bug.
Steps to Reproduce
polaris_aws_cnp_account
resource.delete_snapshots_on_destroy
option is set to true on thepolaris_aws_cnp_account
resource.terraform destory
command.Context
Failure Logs
The text was updated successfully, but these errors were encountered: