-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support force destruction of DataStream private connections #13054
Comments
@laksh-bhat are you able to see if other tools (like gcloud) work as you expected? |
Yes,
|
@laksh-bhat I do see If you want this feature, you may file an enhancement and then it will be triaged. This is not a bug and I am closing it accordingly. |
I understand this may seem like an anti-pattern for terraform but the resource "google_datastream_private_connection" "private_vpc_datastream_conn" {
# This resource must have an IP range with a minimum CIDR block of /29
# https://cloud.google.com/datastream/docs/create-a-private-connectivity-configuration
display_name = "datastream private connection"
project = var.project
location = var.region
private_connection_id = "${var.region}-${var.cell}-${var.env}-datastream-conn"
vpc_peering_config {
vpc = var.private_network_id
subnet = var.datastream_subnet_cidr
}
} The routes created by this, hence, aren't in terraform state. I strongly urge you to reconsider this decision to not implement the |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Note from triage: Reopening to track the request to add a field for configuring |
I ran into this too. Is there an update on how to use terraform to delete |
Community Note
modular-magician
user, it is either in the process of being autogenerated, or is planned to be autogenerated soon. If an issue is assigned to a user, that user is claiming responsibility for the issue. If an issue is assigned tohashibot
, a community member has claimed the issue already.Terraform Version
1.3.4
Affected Resource(s)
Terraform Configuration Files
Debug Output
Panic Output
Expected Behavior
terraform apply -var-file="$TFVARS_FILE" -destroy
is successfulActual Behavior
Steps to Reproduce
terraform apply -var-file="$TFVARS_FILE" -destroy
Important Factoids
References
b/336319220
The text was updated successfully, but these errors were encountered: