-
Notifications
You must be signed in to change notification settings - Fork 676
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ibm_is_vpc ignores attribute “default_network_acl” #1081
Comments
We don't have this default_network_acl now..Its been removed in VPC for gen1 and gen2. |
@hkantare But why is this being deprecated? So now is there any way to deterministically create VPC with default security groups and ACL and attaching them to VPC at the same time while creating VPC ? |
@tkorrapati1 its is not a Terraform provider decision to depreciate the Default NACL attribute. It has been depreciated by VPC development in the VPC mgmt API. Searching I cannot find the reason why. |
@stevestrutt Thanks for clarification. |
Hi there,
Terraform Version
Using terraform version v0.11.14 with provider.ibm v1.1.0 and there are some problems working with VPC gen 1.
Affected Resource(s)
The resource “ibm_is_vpc” ignores attribute “default_network_acl”.
Actual Behaviour
When this resource is created it waits for the resource specified in the attribute “default_network_acl”, then ignores it and creates another network_acl.
If one tries to do another “terraform apply” it tries to change to the correct value, it reports success, but does not change at all (and we stuck with an “extra” network_acl).
Forcing terraform to create this resource only after the network acl creation does not change the results.
Steps to Reproduce
resource "ibm_is_vpc" "test-vpc" {
name = "test-vpc"
resource_group = "resource_group_id"
ignores this part
default_network_acl = "${ibm_is_network_acl.test-acl.id}"
depends_on = ["ibm_is_network_acl.test-acl"]
}
The text was updated successfully, but these errors were encountered: