-
Notifications
You must be signed in to change notification settings - Fork 824
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS: update the timeout EKS update for the kOps build cluster. #7203
base: main
Are you sure you want to change the base?
AWS: update the timeout EKS update for the kOps build cluster. #7203
Conversation
Signed-off-by: Arnaud Meukam <[email protected]>
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ameukam The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@bryantbiggs There is no change in the |
no - we don't have any ignore on the timeouts, those should always be respected |
I can't see why this is ignored. I can see in the debug logs the ref of the variables:
but no changes: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Refreshing state... [id=sgrule-2721142640]
module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]: Refreshing state... [id=sgrule-4148544704]
module.eks.aws_eks_cluster.this[0]: Refreshing state... [id=k8s-infra-kops-prow-build]
No changes. Your infrastructure matches the configuration.
Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. Not sure how to debug this. |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
No description provided.