Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove default from vmss "priority" property #1586

Merged

Conversation

rrudduck
Copy link
Contributor

We have a large number of virtual machine scale sets that were created before priority was an option on them. In those cases the priority property is not returned from ARM and it has no value. By setting a default on this property that "" gets changed to "Regular" and all existing scalesets are marked to be recreated. It appears in my testing that simply removing this default allows existing scalesets to function without this property and adding a value for it in the manifests generate the appropriate diffs.

@tombuildsstuff tombuildsstuff added this to the 1.11.0 milestone Jul 21, 2018
@tombuildsstuff tombuildsstuff added enhancement service/vmss Virtual Machine Scale Sets labels Jul 21, 2018
@katbyte katbyte modified the milestones: 1.11.0, 1.12.0 Jul 25, 2018
@katbyte
Copy link
Collaborator

katbyte commented Jul 30, 2018

Hi @rrudduck,

Thank you for your PR to address this issue. While this might fix your use case, it would now cause anyone relying on the new default to have a diff to "". I think the correct way to solve this would be to add a CustomizeDiff that sets a new value overriding the default when diff'd against to "".

@rrudduck
Copy link
Contributor Author

IMO, compatibility was broken when the change to add the default was made in May. Fixing the diff caused by this is simple as the Azure API returns a value if was previously set - thus all you need to do is add the property to your tf files. The other way - having a default for a field the Azure API makes optional - is more problematic.

I'm fine any way it's resolved. Right now we are having to fork this provider to keep it from incorrectly re-creating vmss instances.

@katbyte
Copy link
Collaborator

katbyte commented Jul 30, 2018

I agree that adding the default with no provision to handle the older scale sets broke backwards compatibility. However currently when creating a new VMSS in the portal priority Regular is assigned by default. Thus I think having the optional parameter default to Regular is the correct behaviour.

@rrudduck
Copy link
Contributor Author

OK. I'm not familiar with the CustomizeDiff func. Looking at the docs it looks like it allows me to control the diff result but does it allow me to change the value that's ultimately passed to the API? Passing the value at all to the API when it's not originally set results in this error from Azure:

{
  "error": {
    "code": "BadRequest",
    "message": "The specified priority value 'Regular' cannot be applied to the VirtualMachineScaleSet '<vmss-name>' since no priority was specified while originally creating the VirtualMachineScaleSet."
  }
}

So even if I suppress the diff, any other change to the scale set would result in the default "Regular" being sent to the API correct? Or am I missing something here?

@tombuildsstuff
Copy link
Member

hey @rrudduck

Apologies for the delayed response here - I've chatted with @katbyte about this and we believe this is probably the right approach - we just need to test the upgrade path here from both an older version of the Provider -> this fix and from the current master -> this fix - both of which I've got this on my list to do today.

Thanks!

@tombuildsstuff tombuildsstuff self-assigned this Aug 1, 2018
Copy link
Member

@tombuildsstuff tombuildsstuff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hey @rrudduck

Thanks for this PR - apologies for the delay reviewing this. I've done some edge-case testing for this and this behaves as expected. I'll kick off the Acceptance Tests not but this otherwise LGTM 👍

Thanks!

@metacpp metacpp self-requested a review August 3, 2018 00:51
@metacpp metacpp self-assigned this Aug 3, 2018
Copy link
Contributor

@metacpp metacpp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@tombuildsstuff
Copy link
Member

Tests pass:

screenshot 2018-08-03 at 05 40 09

@tombuildsstuff tombuildsstuff merged commit 07ca122 into hashicorp:master Aug 3, 2018
tombuildsstuff added a commit that referenced this pull request Aug 3, 2018
@ghost
Copy link

ghost commented Mar 30, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@hashicorp hashicorp locked and limited conversation to collaborators Mar 30, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement service/vmss Virtual Machine Scale Sets
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants