-
Notifications
You must be signed in to change notification settings - Fork 1k
Open
Labels
acknowledgedIssue has undergone initial review and is in our work queue.Issue has undergone initial review and is in our work queue.manifestprogressive applyupstream-terraform
Description
Terraform version, Kubernetes provider version and Kubernetes version
Terraform version: 0.14.11
Kubernetes Provider version: 2.4.1
Kubernetes version: EKS 1.17
Terraform configuration
There is a bit going on here, but essentially this is the output from the terraform_flux_provder, and through some HCL abuse I'm massaging it into the right format.
resource "kubernetes_manifest" "install" {
for_each = { for manifest in local.install_manifest : join("-", [manifest.kind, manifest.metadata.name]) => manifest }
depends_on = [kubernetes_namespace.flux_system]
manifest = each.value
}
resource "kubernetes_manifest" "sync" {
for_each = { for manifest in local.sync_manifest : join("-", [manifest.kind, manifest.metadata.name]) => manifest }
depends_on = [kubernetes_manifest.install]
manifest = each.value
}Question
Essentially I am using the kubernetes_manifest resource, and am trying to:
- Deploy some custom resource definitions
- Deploy some custom resources using the above definitions
Upon doing this I am greeted with an error during the plan because the CRDs have not been created and SSA is not happy about it:
Acquiring state lock. This may take a few moments...
Error: Failed to determine GroupVersionResource for manifest
on main.tf line 49, in resource "kubernetes_manifest" "sync":
49: resource "kubernetes_manifest" "sync" {
no matches for kind "Kustomization" in group "kustomize.toolkit.fluxcd.io"
Error: Failed to determine GroupVersionResource for manifest
on main.tf line 49, in resource "kubernetes_manifest" "sync":
49: resource "kubernetes_manifest" "sync" {
no matches for kind "GitRepository" in group "source.toolkit.fluxcd.io"
Releasing state lock. This may take a few moments...
ERRO[0105] Hit multiple errors:
Hit multiple errors:
exit status 1
Is there a way to tell the provider that things are ok, and not try to plan this? It seems like a bug or required feature before this comes out of experimental, as asking for someone to first apply the CRDs, then add and apply the CRs doesn't seem like a valid long term solution.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
acknowledgedIssue has undergone initial review and is in our work queue.Issue has undergone initial review and is in our work queue.manifestprogressive applyupstream-terraform