-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
eks aws_auth configmap management may cause race conditions #84
Comments
The issue with the security groups not getting deleted during hashicorp/terraform-provider-aws#2445 Usually, another destroy after a failed one cleans things up. |
Just to follow up, |
The |
@HartS can you disentangle the two issues please? They happen due to race conditions but they are not related. |
I've encountered 2 race conditions recently that I believe have been caused by terraform's management of the
aws-auth
configmap hereIn a recent CI-initiated
terraform destroy
, the following error was encountered:During debugging, I noticed that kube couldn't be accessed with the kubeconfig generated by
terraform output
, which led to the discovery that this configmap had already been deleted. This cluster is now in a state where terraform can't destroy it, due to dependencies still existing in that security group, which @colstrom has speculated is due to cleanup of aneni
expected to be managed by the worker node failing, because the worker node could no longer manage cluster resources after deletion of this configmap.This configmap has also led to race conditions during deployment, where
terraform apply
has been failing with alarming frequency, with the following error:Though I believe this is due to attempting to overwrite/patch it before the kube api is up.
The text was updated successfully, but these errors were encountered: