-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Destroying and rebuilding firewall, despite no changes #21521
Comments
Hi @sjackson0109! Can you provide the Because I cannot see the whole |
This is a customer pilot environment, so of course contains private information. I have to be careful what data I share online.
I can say the ‘terraform plan’ section clearly outputs the firewall is being replaced, I would have expected the following statement indicating what causes the replacement `# forces replacement`. Am guessing that is what you are looking for?
I will however perform `terraform plan -out $file`; and have a second pass at reviewing the output asap
|
I think i got to the bottom of it - the Dynamic Block of interface IPs; for_each of the var.product_public_ips was the cause. Interesting these azurerm_public_ip objects all have resource locks on them in azure; so the public IPs are not getting replaced.
I've decided to abandon the Application Gateway AFTER Firewall in favour of the Application Gateway BEFORE Firewall - for the simple fact, the WebApp looses the Public IP address of customers visiting the websites. |
Is there an existing issue for this?
Community Note
Terraform Version
1.4.5 x64
AzureRM Provider Version
3.41.0
Affected Resource(s)/Data Source(s)
azurerm_firewall
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
No replacement of the appliance. This takes the network offline for upto 12 minutes whilst it's deleted and rebuilt!
Actual Behaviour
azurerm_firewall.uks must be replaced
-/+ resource "azurerm_firewall" "uks" {
- dns_servers = [] -> null
~ id = "/subscriptions//resourceGroups/UKSRG01/providers/Microsoft.Network/azureFirewalls/UKSFW" -> (known after apply)
name = "UKSFW"
- private_ip_ranges = [] -> null
- tags = {} -> null
~ threat_intel_mode = "Alert" -> (known after apply)
- zones = [] -> null
# (5 unchanged attributes hidden)
Steps to Reproduce
terraform plan
terraform apply
Important Factoids
None
References
No associations i have found that closely relate to this issue.
The text was updated successfully, but these errors were encountered: