Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error: timeout while waiting for state to become 'success' (timeout: 1m0s) #9793

Closed
Barbarians opened this issue Aug 12, 2021 · 6 comments
Closed
Assignees
Labels

Comments

@Barbarians
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
  • Please do not leave +1 or me too comments, they generate extra noise for issue followers and do not help prioritize the request.
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment.
  • If an issue is assigned to the modular-magician user, it is either in the process of being autogenerated, or is planned to be autogenerated soon. If an issue is assigned to a user, that user is claiming responsibility for the issue. If an issue is assigned to hashibot, a community member has claimed the issue already.

Terraform Version

Terraform v1.0.4

Affected Resource(s)

  • google_container_cluster

Terraform Configuration Files

provider "google-beta" {}

terraform {
  backend "gcs" {}
}

resource "google_container_cluster" "primary" {
  provider = google-beta
  for_each = var.clusters

  name                     = each.value["name"]
  location                 = each.value["location"]
  subnetwork               = each.value["subnetwork"]
  description              = var.description
  initial_node_count       = var.initial_node_count
  remove_default_node_pool = true
  enable_legacy_abac       = false
  network                  = var.network
  project                  = var.project

  default_max_pods_per_node   = var.default_max_pods_per_node
  enable_intranode_visibility = var.enable_intranode_visibility

  enable_shielded_nodes = var.enable_shielded_nodes

  network_policy {
    enabled = var.network_policy_enabled
  }

  cluster_autoscaling {
    enabled             = var.cluster_autoscaling_enabled
    autoscaling_profile = var.autoscaling_profile
  }

  addons_config {
    horizontal_pod_autoscaling {
      disabled = false
    }
    http_load_balancing {
      disabled = var.http_load_balancing
    }
    istio_config {
      disabled = true
    }
    cloudrun_config {
      disabled = true
    }
    dns_cache_config {
      enabled = var.dns_cache_config
    }
    gce_persistent_disk_csi_driver_config {
      enabled = true
    }
  }

  ip_allocation_policy {
    cluster_secondary_range_name  = each.value["cluster_secondary_range_name"]
    services_secondary_range_name = each.value["services_secondary_range_name"]
  }

  release_channel {
    channel = var.maintenance_channel
  }

  maintenance_policy {
    recurring_window {
      start_time = var.maintenance_weekly_start_time
      end_time   = var.maintenance_weekly_end_time
      recurrence = format("FREQ=WEEKLY;BYDAY=%s", var.maintenance_weekly_days)
    }
  }

  private_cluster_config {
    enable_private_nodes    = var.enable_private_nodes
    enable_private_endpoint = var.enable_private_endpoint
    master_ipv4_cidr_block  = each.value["master_ipv4_cidr_block"]
    master_global_access_config {
      enabled = var.master_global_access_config
    }
  }

  master_auth {
    client_certificate_config {
      issue_client_certificate = false
    }
  }

  authenticator_groups_config {
    security_group = "gke-security-groups@******"
  }

  pod_security_policy_config {
    enabled = false
  }

  database_encryption {
    state    = var.database_encryption_state
    key_name = var.database_encryption_key_name
  }

  workload_identity_config {
    identity_namespace = "${var.project}.svc.id.goog"
  }

  master_authorized_networks_config {
    dynamic "cidr_blocks" {
      for_each = each.value["authorized_cidr_blocks_list"]
      content {
        cidr_block   = cidr_blocks.value["cidr_block"]
        display_name = cidr_blocks.value["display_name"]
      }
    }
  }

  enable_tpu              = false
  enable_kubernetes_alpha = false

  monitoring_service = "monitoring.googleapis.com/kubernetes"
  logging_service    = "logging.googleapis.com/kubernetes"

  resource_usage_export_config {
    enable_network_egress_metering       = true
    enable_resource_consumption_metering = true

    bigquery_destination {
      dataset_id = var.bigquery_destination_dataset_id
    }
  }
}

Panic Output

https://gist.github.com/Barbarians/1d843aedaca8d83d3edf82f645a01148

Expected Behavior

Create a new cluster

Actual Behavior

Nothing

Steps to Reproduce

  1. terraform apply
@Barbarians Barbarians added the bug label Aug 12, 2021
@edwardmedia
Copy link
Contributor

@Barbarians someone has reported a similar issue (below). Can you see if that makes sense to you?

#9691

@Barbarians
Copy link
Author

Barbarians commented Aug 12, 2021

Hey @edwardmedia,

I tried to use other version provider google-beta but no change.
I see that in Debug mode :

https://gist.github.com/Barbarians/8bf197988060f1e20aade523fab03e9d

@edwardmedia
Copy link
Contributor

@Barbarians it is hard to say for below error. it could be api that was experiencing difficulties. Have you run the config before?

Error code 500, Internal error encountered.

For debug, does the example work for you? If yes, maybe try to gradually add more code blocks to see which one causes the issue?

@Barbarians
Copy link
Author

Barbarians commented Aug 13, 2021

@edwardmedia this config work fine, it's been 2-3 days since it works anymore.

It's been 3 months since I deployed my infrastructure on gcp and mongo atlas without any problem.

I try to deploy blocks by block and i back

@Barbarians
Copy link
Author

@edwardmedia i have resolve my problem.

The security group "gke-security-groups@****" is not set in my organisation.

Now is good all clusters is deploy on my infrastructure.

But i think its better a message "Security group does not exist" but not "Error: timeout while waiting for state to become 'success' (timeout: 1m0s)" in terraform and gcp api return "backendError"

@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 13, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants