-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add deletion_protection argument to google_container_cluster #10168
Comments
Capturing my thoughts from triage earlier today:
I'm undecided if we should make the change at all or not, as GKE is a mix between a compute product / having a database (the apiserver). I'm leaning yes, given that deleting a GKE cluster is pretty clearly not part of normal operations. I wish Terraform was less delete-prone from the start, so that this wasn't decided on a case-by-case basis by our team! |
Definitely, hashicorp/terraform#3116 would be highly preferable and allow you to rip out all of the google provider specific |
@rileykarson want to huge bump this in priority, just happened again with #14203 where this would have been extremely helpful |
@rileykarson now that we are over 2 weeks from the incident that caused us to re-bump this, can you please update on the current status? If this is not getting executed on in the near term, my company's leadership is pushing for us to do some very hacky work arounds that I really don't want to do, especially since it sounds like we are aligned on the value and desirability of adding this feature. |
I'm following up with some relevant stakeholders internally to Google and will get back to this when I've collected enough feedback. This is likely to take O(weeks) to turn around a final decision on. The initial folks I talked to expressed concern about adding a
Depending on your internal platform, I've heard that customers have used policy tools like Sentinel or Additionally I'll raise https://github.com/hashicorp/terraform-provider-google/wiki/Customer-Contact#raising-gcp-internal-issues-with-the-provider-development-team as an extra feedback mechanism, in addition to this issue. Thanks for kicking up the discussion on those hashicorp/terraform issues! I'm not really satisfied with the central response at the moment. I'll discuss with them through our channels. I'm leaning towards adding some provider-wide improvements to this stuff to the
|
Regarding the default conversation, what about introducing the variable now with a default to
Yes, obviously I can't see the document behind those links, but I believe we have been following it via our TAM Fabio who I believe has chatted with you about this. We've also had support case |
@rileykarson would ^ be a reasonable approach to move forwards with in the immediate term? |
Sorry, been a bit swamped! quick updated: Based on the mentioned internal discussions we're definitely going to avoid the default-to-true option in a minor release, and hold that for a major.
I'll follow up through those channels! I've reemphasized the chain of issues above with HashiCorp, also, so hopefully we see some additional activity as a result. Gonna continue doing so intermittently.
I'm really hesitant to break the rule that |
I think the part that I am struggling with as someone who has dealt with multiple, very impactful major incidents related to this is the balancing of the real, demonstrated multiple times harm of NOT having this option vs the potential for temporary confusion until the next major release. Like to me the benefits of adding it now and accepting the temporary risk of confusion for people who don't read the docs closely before the next major release and don't explicitly set a value are super clear because I've lived through multiple MIs related to this. Also, it is always possible for someone who does not closely read the docs to shoot themselves in the foot so I don't put a lot of weight in that argument as a reason why we should not have an option that prevents major incidents for people who have read the docs and do understand what they are doing, especially since there is a clear timeline (the next major release) for resolving those concerns about users being confused by the default behavior. |
@rileykarson does that make sense and would implementing this in the next release be possible? This is a really big deal for my company and we really don't want to wait until the fall. Additionally, I think there is a pretty good argument that introducing the argument before the behavior of the resource changes would be advantageous for users since they could explicitly set the argument for their desired behavior before there is a change to the default behavior. If the argument is only introduced when the default behavior is changed, then people have to make sure they are timing the introduction of the new argument and the provider version upgrade if they want to maintain existing behavior of |
I'll discuss w/ some folks on the team! I don't think that the next release would be possible (that cutoff is EOD today), but within the next few weeks would be if we decide to move forward w/ it. Edit: Removing milestone to make sure this comes up in triage. |
@rileykarson wanted to see what the results of triage were since I saw you added the 5.0.0 milestone. Is the idea of adding the flag now with a default of false on the table/happening soon or has that idea been rejected in favor of adding it with default of true in 5.0.0 and having all of the associated upgrade timing concerns as a result? |
Sorry, meant to follow up yesterday after clicking the button! I followed up w/ a few other maintainers and the general consensus was that we should wait for |
do we have at ETA on 5.0.0 release ? @rileykarson |
Oct 2, see #15582 |
thank you!
*Sanmay Mishra*
Infrastructure Cloud Consultant
804-319-9657 <(804)%319-9657> Mobile
*“I choose to work flexibly & send emails outside normal office hours. **Please
do not feel obligated to respond out of your normal working hours."*
…On Mon, Sep 18, 2023 at 12:48 PM Riley Karson ***@***.***> wrote:
Oct 2, see #15582
<#15582>
—
Reply to this email directly, view it on GitHub
<#10168 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AYIACZXXBRJXER7DJQJZTDDX3CQSJANCNFSM5E22CHOA>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
closed with GoogleCloudPlatform/magic-modules#9013 Targeted for the 5.0.0 release which is scheduled for next week. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Add
deletion_protection
argument togoogle_container_cluster
, the same as how it currently exists for some other longer-lived resources like sql_database_instance. This would be extremely useful since, similar to losing a database, losing a GKE cluster is typically a difficult process for people to replace.New or Affected Resource(s)
Potential Terraform Configuration
References
b/299312662
The text was updated successfully, but these errors were encountered: