We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terraform version: v1.9.4 ArgoCD provider version: v7.0.3-7.2.0 ArgoCD version: v2.13.2
locals { argo_app_id = "cluster-bootstrap-${var.workload_name}-${var.env}" } import { to = argocd_application.bootstrap_cluster id = local.argo_app_id }
resource "argocd_cluster" "eks" { server = module.eks.cluster_endpoint name = module.eks.cluster_name project = var.env config { aws_auth_config { cluster_name = module.eks.cluster_name role_arn = var.argo_role_arn } tls_client_config { ca_data = base64decode(module.eks.cluster_certificate_authority_data) } } lifecycle { ignore_changes = [ metadata ] } } resource "argocd_application" "bootstrap_cluster" { metadata { name = "cluster-bootstrap-${var.workload_name}-${var.env}" namespace = "argocd" } spec { project = "${var.env}" destination { name = "eks-${var.workload_name}-${var.env}" namespace = "${var.workload_name}" } source { repo_url = "https://gitlab.com/breeze-airways/devops/argocd.git" path = "helm/cluster-bootstrap" target_revision = "HEAD" helm { values = yamlencode({ #destination_server = "" destination_server_name = "eks-${var.workload_name}-${var.env}" project = var.env cluster_endpoint = module.eks.cluster_endpoint cluster_name = module.eks.cluster_name env = var.env region = var.region vpc_id = data.aws_vpc.eks.id karpenter = { enabled = true version = "1.0.3" sa_role_arn = module.karpenter.iam_role_arn interruption_queue = "Karpenter-eks-${var.env}" } nops = { enabled = true cluster_id = module.eks.cluster_id } alb_controller = { enabled = true sa_role_arn = module.alb_controller_irsa_role.iam_role_arn version = "1.7.2" } external_secrets = { enabled = true sa_role_arn = var.deploy_external_secrets ? module.eso_irsa_role[0].iam_role_arn : null } hpa = { enabled = true } }) } } sync_policy { automated { prune = true self_heal = true } sync_options = [ "CreateNamespace=true" ] } } }
https://gist.github.com/dkstevens2000/25124344dcdb83a27aec950ecb2ee02a
https://gist.github.com/dkstevens2000/6d5a1b4d91cb49da8deeb79a18e83df9
Run terraform apply on the above configuration
Should create an argo application called cluster-bootstrap
argocd provider crashes if the import is used.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Terraform Version, ArgoCD Provider Version and ArgoCD Version
Affected Resource(s)
Terraform Configuration Files
Debug Output
https://gist.github.com/dkstevens2000/25124344dcdb83a27aec950ecb2ee02a
Panic Output
https://gist.github.com/dkstevens2000/6d5a1b4d91cb49da8deeb79a18e83df9
Steps to Reproduce
Run terraform apply on the above configuration
Expected Behavior
Should create an argo application called cluster-bootstrap
Actual Behavior
argocd provider crashes if the import is used.
Important Factoids
References
Community Note
The text was updated successfully, but these errors were encountered: