-
Notifications
You must be signed in to change notification settings - Fork 122
Description
Is your feature request related to a problem? Please describe.
The Elasticsearch authentication on resource-level elasticsearch_connection
will be deprecated, which forces the usage of a provider that uses hardcoded credentials or a provider that depends the resource ec_deployment
.
Using a hardcoded provider goes against the principle of using a single Elastic Cloud Terraform provider to configure multiple deployments that have Elasticsearch resources. Defining the the Elasticsearch authentication on resource level suits usage of the Elastic Cloud Terraform provider.
If a Terraform module that contains an Elastic Cloud deployment with Elasticsearch resources is destroyed, the Elasticsearch resources can't be deleted because the Elastic Stack Terraform provider is also destroyed in the same run (#509 (comment)).
Notice that the Elastic Stack provider is not configured, since we'll be using an
elasticsearch_connection
block
for each of our resources, to point to the Elastic Cloud deployment. This is becauseterraform
can not configure providers that are dependent on one another. - https://github.com/elastic/terraform-provider-elasticstack/pull/16/files#diff-b9b7a6e1524a6af9ff3c316d95a6dd1fa5b95d95e130de3ed83228f34e8b4929R40-R41
This issue is related to #509, because authentication on resource-level has not been implemented for Kibana.
Describe the resource you would like to have implemented.
Don't remove Elasticsearch authentication on resource-level elasticsearch_connection
and don't force the Elasticsearch connection via the provider configuration.