Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

401 error when trying to create Encryption At Rest #192

Closed
piotrgwiazda opened this issue Apr 9, 2020 · 9 comments
Closed

401 error when trying to create Encryption At Rest #192

piotrgwiazda opened this issue Apr 9, 2020 · 9 comments

Comments

@piotrgwiazda
Copy link

I am trying to setup Encryption at rest with Azure using Terraform.
In general it works when calling Mongo DB Atlas REST API with CURL, but does not work via Terraform.

Here is Terraform code

resource "mongodbatlas_encryption_at_rest" "atlas_kms_config" {
  project_id = var.mongo_project_id

  azure_key_vault = {
    enabled             = true
    azure_environment   = "AZURE"
    tenant_id           = azurerm_key_vault.kv.tenant_id
    client_id           = data.azurerm_key_vault_secret.atlas_kms_sp_app_id.value
    secret              = data.azurerm_key_vault_secret.atlas_kms_sp_secret.value
    subscription_id     = data.azurerm_client_config.current.subscription_id
    resource_group_name = azurerm_key_vault.kv.resource_group_name
    key_vault_name      = azurerm_key_vault.kv.name
    key_identifier      = azurerm_key_vault_key.atlas_generated.id
  }

  depends_on = [azurerm_key_vault_key.atlas_generated,
    azurerm_key_vault_access_policy.atlas_kms_access,
    azurerm_role_assignment.atlas_read_access
  ]

}

Terraform fails with 401 error
Terraform logs (sensitive data removed)

2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: 2020/04/09 13:58:37 [DEBUG] MongoDB Atlas API Request Details:
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: ---[ REQUEST ]---------------------------------------
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: PATCH /api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest HTTP/1.1
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Host: cloud.mongodb.com
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: User-Agent: go-mongodbatlas0.1
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Content-Length: 544
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Accept: application/json
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Content-Type: application/json
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Accept-Encoding: gzip
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: {
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  "awsKms": {
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "enabled": false
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  },
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  "azureKeyVault": {
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "enabled": true,
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "clientID": "-------------",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "azureEnvironment": "AZURE",
erraform-provider-mongodbatlas_v0.4.2_x4:   "subscriptionID": "-------------",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "resourceGroupName": "the-resrouce-group",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "keyVaultName": "the-key-vault",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "keyIdentifier": "https://the-key-vault.vault.azure.net/keys/the-key/1412a98d550e4b6e975aa24dc2e12345",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "secret": "-------------",
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "tenantID": "-------------"
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  },
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  "googleCloudKms": {
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:   "enabled": false
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:  }
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: }
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:
2020-04-09T13:58:37.280Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: -----------------------------------------------------
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: 2020/04/09 13:58:37 [DEBUG] MongoDB Atlas API Response Details:
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: ---[ RESPONSE ]--------------------------------------
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: HTTP/2.0 401 Unauthorized
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Www-Authenticate: Digest realm="MMS Public API", domain="", nonce="+cuckackmQPl8HzqHP8a8xohT7uaNSMS", algorithm=MD5, qop="auth", stale=false
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: Content-Length: 0
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4:
2020-04-09T13:58:37.415Z [DEBUG] plugin.terraform-provider-mongodbatlas_v0.4.2_x4: -----------------------------------------------------
2020/04/09 13:58:37 [DEBUG] module.main.mongodbatlas_encryption_at_rest.atlas_kms_config: apply errored, but we're indicating that via the Error pointer rather than returning it: error creating Encryption at Rest: PATCH https://cloud.mongodb.com/api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest: 401 (request "")
2020/04/09 13:58:37 [ERROR] module.main: eval: *terraform.EvalApplyPost, err: error creating Encryption at Rest: PATCH https://cloud.mongodb.com/api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest: 401 (request "")
ing Encryption at Rest: PATCH https://cloud.mongodb.com/api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest: 401 (request "")

Error: error creating Encryption at Rest: PATCH https://cloud.mongodb.com/api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest: 401 (request "")

  on ../../main/atlas-kms.tf line 10, in resource "mongodbatlas_encryption_at_rest" "atlas_kms_config":
  10: resource "mongodbatlas_encryption_at_rest" "atlas_kms_config" {

However, when I take the same JSON and run it via CLI it works.

curl -X PATCH -i -u 'XXX:YYYY' --digest \
 --header "Accept: application/json" \
 --header "Content-Type: application/json" \
 "https://cloud.mongodb.com/api/atlas/v1.0/groups/5e3879f6a6f239a1219fd793/encryptionAtRest?pretty=true" \
 --data '
{
 "awsKms": {
  "enabled": false
 },
 "azureKeyVault": {
  "enabled": true,
  "clientID": "-------------",
  "azureEnvironment": "AZURE",
  "subscriptionID": "-------------",
  "resourceGroupName": "the-resrouce-group",
  "keyVaultName": "the-key-vault",
  "keyIdentifier": "https://the-key-vault.vault.azure.net/keys/the-key/1412a98d550e4b6e975aa24dc2e12345",
  "secret": "-------------",
  "tenantID": "-------------"
 },
 "googleCloudKms": {
  "enabled": false
 }
}'

The curl output shows 401 response as a first response as well, but then 202.

HTTP/2 401
www-authenticate: Digest realm="MMS Public API", domain="", nonce="Hp5SAclXQlZx15aJKbVk4mAIgaifW600", algorithm=MD5, qop="auth", stale=false
content-length: 0

HTTP/2 202
content-type: application/json
strict-transport-security: max-age=31536000
date: Thu, 09 Apr 2020 13:54:42 GMT
x-mongodb-service-version: gitHash=fa1775e0db9677dba2f4e6a070181cae8d1a8f3f; versionString=v20200331
content-length: 768
@themantissa
Copy link
Collaborator

We'll take a look, thank you for the details. That helps a great deal. FYI @PacoDw

@michaljrk
Copy link

Hello,
are there any updates on that issue?

I believe I've faced a similar one (while performing a different action though, but the symptoms seem to be similar).
When trying to import an existing Atlas Project (created manually from outside terraform), I'm getting 401 too:

terraform import mongodbatlas_project.atlas-test-project-imported 5a70XXXXXX
mongodbatlas_project.atlas-test-project-imported: Importing from ID "5a70XXXXXX"...
mongodbatlas_project.atlas-test-project-imported: Import prepared!
  Prepared mongodbatlas_project for import
mongodbatlas_project.atlas-test-project-imported: Refreshing state... [id=5a70XXXXXX]

Error: error getting project(5a70XXXXXX): GET https://cloud.mongodb.com/api/atlas/v1.0/groups/5a70XXXXXX: 401 (request "Unauthorized") You are not authorized for this resource.

While trying to simulate a similar api call from curl, it works fine (200 response code is preceded by 401, similarly to what @piotrgwiazda reported above).

Also, when trying to create the project using mongodbatlas_project resource (instead of importing it), everything works fine.

@themantissa
Copy link
Collaborator

@michaljrk no but that's helpful information so will add a link to the other issue to this one. It may help during attempted repro. Thank you!

@nikhil-mongo
Copy link
Collaborator

nikhil-mongo commented Jan 21, 2021

@piotrgwiazda

The first 401 and then 200 response seen is due to the digest auth mechanism used by the Atlas API. However, please confirm if you are still facing this issue or has this resolved for you.

In case this is still the case, Please confirm the below details for the further troubleshooting here:

  • The Project ID used
  • The API key username

Thanks.

@themantissa
Copy link
Collaborator

Is this still an issue? If not going to close it?

@vikassinha2019
Copy link

vikassinha2019 commented Dec 27, 2021

This is still an issue. I am using Terraform v0.13.6 and "mongodb/mongodbatlas" version = "1.1.1".

We have a public/private key-pair in project with full permissions on that project and at Organization level, that key-pair has 'Organization Member' access. No IP restriction applied.

We are trying to create alerts in Atlas via terraform, where we are getting following error, when Terraform is making POST call to /api/atlas/v1.0/groups//alertConfigs HTTP/1.1

mongodbatlas_alert_configuration.HOST_DOWN[0]: Creating...
2021/12/27 10:54:45 [DEBUG] EvalApply: ProviderMeta config value set
2021/12/27 10:54:45 [DEBUG] mongodbatlas_alert_configuration.HOST_DOWN[0]: applying the planned Create change
2021-12-27T10:54:45.161+0530 [INFO]  plugin.terraform-provider-mongodbatlas_v1.1.1: 2021/12/27 10:54:45 [DEBUG] MongoDB Atlas API Request Details:
---[ REQUEST ]---------------------------------------
POST /api/atlas/v1.0/groups/<staging group id>/alertConfigs HTTP/1.1
Host: cloud.mongodb.com
User-Agent: terraform-provider-mongodbatlas/1.1.1 go-mongodbatlas/0.14.0 (darwin;amd64)
Content-Length: 156
Accept: application/json
Content-Type: application/json
Accept-Encoding: gzip

{
 "eventTypeName": "HOST_DOWN",
 "enabled": true,
 "notifications": [
  {
   "delayMin": 0,
   "emailEnabled": false,
   "intervalMin": 15,
   "smsEnabled": false,
   "typeName": "WEBHOOK"
  }
 ]
}

-----------------------------------------------------: timestamp=2021-12-27T10:54:45.161+0530
2021-12-27T10:54:46.539+0530 [INFO]  plugin.terraform-provider-mongodbatlas_v1.1.1: 2021/12/27 10:54:46 [DEBUG] MongoDB Atlas API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/2.0 401 Unauthorized
Content-Length: 106
Content-Type: application/json
Date: Mon, 27 Dec 2021 05:24:46 GMT
Server: envoy
Www-Authenticate: Digest realm="MMS Public API", domain="", nonce="HHKNxxxxxxxxxxJ+C1W3", algorithm=MD5, qop="auth", stale=false
X-Envoy-Upstream-Service-Time: 26

{
  "error" : 401,
  "reason" : "Unauthorized",
  "detail" : "You are not authorized for this resource."
}
-----------------------------------------------------: timestamp=2021-12-27T10:54:46.538+0530
2021/12/27 10:54:46 [DEBUG] mongodbatlas_alert_configuration.HOST_DOWN[0]: apply errored, but we're indicating that via the Error pointer rather than returning it: error creating Alert Configuration information: POST https://cloud.mongodb.com/api/atlas/v1.0/groups/<staging group id>/alertConfigs: 401 (request "") You are not authorized for this resource.
2021/12/27 10:54:46 [ERROR] eval: *terraform.EvalApplyPost, err: error creating Alert Configuration information: POST https://cloud.mongodb.com/api/atlas/v1.0/groups/<staging group id>/alertConfigs: 401 (request "") You are not authorized for this resource.
2021/12/27 10:54:46 [ERROR] eval: *terraform.EvalSequence, err: error creating Alert Configuration information: POST https://cloud.mongodb.com/api/atlas/v1.0/groups/<staging group id>/alertConfigs: 401 (request "") You are not authorized for this resource.

Error: error creating Alert Configuration information: POST https://cloud.mongodb.com/api/atlas/v1.0/groups/<staging group id>/alertConfigs: 401 (request "") You are not authorized for this resource.

  on main.tf line 1, in resource "mongodbatlas_alert_configuration" "HOST_DOWN":
   1:  resource "mongodbatlas_alert_configuration" "HOST_DOWN" {


2021-12-27T10:54:46.568+0530 [WARN]  plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-12-27T10:54:46.571+0530 [DEBUG] plugin: plugin process exited: path=.terraform/plugins/registry.terraform.io/mongodb/mongodbatlas/1.1.1/darwin_amd64/terraform-provider-mongodbatlas_v1.1.1 pid=22524
2021-12-27T10:54:46.571+0530 [DEBUG] plugin: plugin exited

However, when I run the curl command against the same API, with that public-private key pair as POST "https://cloud.mongodb.com/api/atlas/v1.0/groups//alertConfigs", the alert is getting created fine.

@themantissa
Copy link
Collaborator

@vikassinha2019 this is not the same issue as reported here. Without your configuration or other details I can't tell you why you aren't having success with Terraform. I would suggest reaching out to Atlas support for assistance.

@velann21
Copy link

velann21 commented Feb 17, 2022

@themantissa I have the same issue while calling modify cluster through the API.

Request:
curl -u "xxxxx:yyyyyy" --digest
--header "Content-Type: application/json"
--include
--request PATCH "https://cloud.mongodb.com/api/atlas/v1.5/groups/ccccccccc/clusters/xxxxxx?pretty=true" --data '
{"@provider":"AZURE","backupEnabled":false,"biConnector":{"enabled":false,"readPreference":"secondary"},"clusterTags":[],"clusterType":"REPLICASET","continuousDeliveryFCV":null,"deleteAfterDate":null,"deploymentClusterName":"atlas-42k40e","deploymentItemName":"atlas-42k40e-shard-0","diskBackupEnabled":true,"diskSizeGB":32,"encryptionAtRestProvider":"NONE","fixedMongoDBFCV":null,"forceReplicaSetReconfig":false,"geoSharding":{"customZoneMapping":{},"managedNamespaces":[]},"groupId":"61fa70187434774be5631324","hostnameSchemeForAgents":"INTERNAL","hostnameSubdomainLevel":"MONGODB","isCrossCloudCluster":false,"isMongoDBVersionFixed":false,"isMonitoringPaused":false,"isNvme":false,"isPaused":false,"labels":[],"lastUpdateDate":"2022-02-15T14:12:23Z","maxIncomingConns":3000,"mongoDBMajorVersion":"4.4","mongoDBUriHosts":["xxxx-shard-00-00.x7fjr.mongodb.net:27017","xxxx-shard-00-01.x7fjr.mongodb.net:27017","xxxx-shard-00-02.x7fjr.mongodb.net:27017","xxxxx-shard-00-03.x7fjr.mongodb.net:27017","xxxxx-shard-00-04.x7fjr.mongodb.net:27017"],"mongoDBUriHostsLastUpdateDate":"2022-02-15T14:25:15Z","name":"Cluxxxxster0","needsMongoDBConfigPublishAfter":null,"pitEnabled":false,"privateLinkMongoDBUriHosts":{},"privateLinkSrvAddresses":{},"privateMongoDBUriHosts":["xxxx-shard-00-00-pri.x7fjr.mongodb.net:27017","xxxxx-shard-00-01-pri.x7fjr.mongodb.net:27017","xxx-shard-00-02-pri.x7fjr.mongodb.net:27017","xxxx-shard-00-03-pri.x7fjr.mongodb.net:27017","xxxx-shard-00-04-pri.x7fjr.mongodb.net:27017"],"privateSrvAddress":"xxxx-pri.x7fjr.mongodb.net","replicationSpecList":[{"id":"620b832cfc45ea4a60d2ab7c","numShards":1,"regionConfigs":[{"analyticsSpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":0},"autoScaling":{"autoIndex":{"enabled":false},"compute":{"enabled":false,"maxInstanceSize":null,"minInstanceSize":null,"scaleDownEnabled":false},"diskGB":{"enabled":true}},"cloudProvider":"AZURE","electableSpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":2},"priority":7,"readOnlySpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":0},"regionName":"US_EAST_2","regionView":{"continent":"North America","isRecommended":true,"key":"US_EAST_2","latitude":36.6770547,"location":"Virginia-East2","longitude":-78.3790247,"name":"eastus2","provider":"AZURE"}},{"analyticsSpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":0},"autoScaling":{"autoIndex":{"enabled":false},"compute":{"enabled":false,"maxInstanceSize":null,"minInstanceSize":null,"scaleDownEnabled":false},"diskGB":{"enabled":false}},"cloudProvider":"AZURE","electableSpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":3},"priority":6,"readOnlySpecs":{"diskIOPS":120,"diskType":"P4","instanceSize":"M30","nodeCount":0},"regionName":"US_EAST","regionView":{"continent":"North America","isRecommended":true,"key":"US_EAST","latitude":37.926868,"location":"Virginia","longitude":-78.024902,"name":"eastus","provider":"AZURE"}}],"zoneName":"Zone 1"}],"restrictedEmployeeAccessBypassDate":null,"resurrectOptions":null,"resurrectRequested":null,"rootCertType":"ISRGROOTX1","srvAddress":"xxxxxx.x7fjr.mongodb.net","state":"UPDATING","tenantAccessRevokedForPause":false,"tenantUpgrading":false,"uniqueId":"620b839519bad52e92acf972","userNotifiedAboutPauseDate":null,"versionReleaseSystem":"LTS"}'

Actual Response got:

www-authenticate: Digest realm="MMS Public API", domain="", nonce="hTpUs4JXZ2Eoh/qdDGDlLPqRBF2noG5J", algorithm=MD5, qop="auth", stale=false
content-length: 0
x-envoy-upstream-service-time: 2
date: Thu, 17 Feb 2022 11:38:26 GMT
server: envoy

HTTP/2 200
date: Thu, 17 Feb 2022 11:38:27 GMT
strict-transport-security: max-age=31536000; includeSubdomains;
referrer-policy: strict-origin-when-cross-origin
x-permitted-cross-domain-policies: none
x-content-type-options: nosniff
x-mongodb-service-version: gitHash=ce32f58d12d5f58688149ca3774f769b3b48da2f; versionString=v20220216
content-type: application/json
x-frame-options: DENY
content-length: 2645
x-envoy-upstream-service-time: 309
server: envoy

{
  "backupEnabled" : false,
  "biConnector" : {
    "enabled" : false,
    "readPreference" : "secondary"
  },
  "clusterType" : "REPLICASET",
  "connectionStrings" : {
    "private" : "mongodb://xxxxx-shard-00-00-pri.x7fjr.mongodb.net:27017,xxxxx-shard-00-01-pri.x7fjr.mongodb.net:27017,xxxxx-shard-00-02-pri.x7fjr.mongodb.net:27017,xxxxx-shard-00-03-pri.x7fjr.mongodb.net:27017,xxxxx-shard-00-04-pri.x7fjr.mongodb.net:27017/?ssl=true&authSource=admin&replicaSet=atlas-42k40e-shard-0",
    "privateSrv" : "mongodb+srv://xxxx-pri.x7fjr.mongodb.net",
    "standard" : "mongodb://xxxx-shard-00-00.x7fjr.mongodb.net:27017,xxxxx-shard-00-01.x7fjr.mongodb.net:27017,xxxx-shard-00-02.x7fjr.mongodb.net:27017,xxxxx-shard-00-03.x7fjr.mongodb.net:27017,xxxxx-shard-00-04.x7fjr.mongodb.net:27017/?ssl=true&authSource=admin&replicaSet=atlas-42k40e-shard-0",
    "standardSrv" : "mongodb+srv://xxxxx.x7fjr.mongodb.net"
  },
  "createDate" : "2022-02-15T10:42:29Z",
  "diskSizeGB" : 32.0,
  "encryptionAtRestProvider" : "NONE",
  "groupId" : "61fa70187434774be5631324",
  "id" : "620b839519bad52e92acf972",
  "labels" : [ ],
  "mongoDBMajorVersion" : "4.4",
  "mongoDBVersion" : "4.4.12",
  "name" : "xxxxxx",
  "paused" : false,
  "pitEnabled" : false,
  "replicationSpecs" : [ {
    "id" : "620b832cfc45ea4a60d2ab7c",
    "numShards" : 1,
    "regionConfigs" : [ {
      "analyticsSpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 0
      },
      "autoScaling" : {
        "compute" : {
          "enabled" : false,
          "scaleDownEnabled" : false
        },
        "diskGB" : {
          "enabled" : true
        }
      },
      "electableSpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 2
      },
      "priority" : 7,
      "providerName" : "AZURE",
      "readOnlySpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 0
      },
      "regionName" : "US_EAST_2"
    }, {
      "analyticsSpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 0
      },
      "autoScaling" : {
        "compute" : {
          "enabled" : false,
          "scaleDownEnabled" : false
        },
        "diskGB" : {
          "enabled" : false
        }
      },
      "electableSpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 3
      },
      "priority" : 6,
      "providerName" : "AZURE",
      "readOnlySpecs" : {
        "instanceSize" : "M30",
        "nodeCount" : 0
      },
      "regionName" : "US_EAST"
    } ],
    "zoneName" : "Zone 1"
  } ],
  "rootCertType" : "ISRGROOTX1",
  "stateName" : "UPDATING",
  "versionReleaseSystem" : "LTS"
}```


Expected Response should be 200 for both the API.

@themantissa
Copy link
Collaborator

Not the same issue above. I'm closing this out. Any related issues should be open as a fresh issue and include the information we request to investigate, including the tf config and any logs. Thanks!

@themantissa themantissa reopened this Oct 19, 2022
@themantissa themantissa closed this as not planned Won't fix, can't repro, duplicate, stale Oct 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants