Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terraform: GKE module leftovers after apply and destroy #1403

Closed
aLekSer opened this issue Mar 9, 2020 · 4 comments
Closed

Terraform: GKE module leftovers after apply and destroy #1403

aLekSer opened this issue Mar 9, 2020 · 4 comments
Assignees
Labels
area/operations Installation, updating, metrics etc kind/bug These are bugs.
Milestone

Comments

@aLekSer
Copy link
Collaborator

aLekSer commented Mar 9, 2020

There are 3 Firewall rules are left behind after performing successfully terraform apply and terraform destroy

Firewall Rules

What happened:
One Firewall Rule relates to Ping UDP service.

k8s-fw-a47812a5e622211eab1ab42010a8a002
Description{"kubernetes.io/service-name":"agones-system/agones-ping-udp-service", "kubernetes.io/service-ip":"34.82.191.32"}

What you expected to happen:

No resource left after full cycle : deploy and destroy.

How to reproduce it (as minimally and precisely as possible):
https://agones.dev/site/docs/installation/terraform/gke/

Anything else we need to know?:

All firewall rules are deleted if you run:
helm delete --purge agones
before running:
terraform destroy

Environment:

  • Agones version:
  • Kubernetes version (use kubectl version):
  • Cloud provider or hardware configuration:
  • Install method (yaml/helm):
  • Troubleshooting guide log(s):
  • Others:
@aLekSer
Copy link
Collaborator Author

aLekSer commented Mar 23, 2020

I would update documentation for installing Agones on different cloud providers (GKE, AKS, EKS) with following line after testing that all of them will support such a fix:

terraform destroy -target module.helm_agones.helm_release.agones -auto-approve && sleep 60 && terraform destroy -auto-approve

@aLekSer
Copy link
Collaborator Author

aLekSer commented Jul 17, 2020

Let me check if Helm 3 helps with fixing this bug.
At the first glance it is fixed as per this test:
#1483

@aLekSer
Copy link
Collaborator Author

aLekSer commented Jul 17, 2020

Before terraform destroy:

gcloud compute firewall-rules list  | grep terratest-cluster2 | wc -l

After terraform destroy:

gcloud compute firewall-rules list  | grep terratest-cluster2 | wc -l
0

This proves that switch to Helm 3 fix the problem with dangling Firewall Rules.

@aLekSer aLekSer closed this as completed Jul 17, 2020
@markmandel markmandel added this to the 1.8.0 milestone Jul 17, 2020
@markmandel
Copy link
Collaborator

That's awesome! 🔥

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/operations Installation, updating, metrics etc kind/bug These are bugs.
Projects
None yet
Development

No branches or pull requests

2 participants