Skip to content

[Feature] Don't remove the Elasticsearch authentication on resource-level elasticsearch_connection Β #546

@Zawadidone

Description

@Zawadidone

Is your feature request related to a problem? Please describe.
The Elasticsearch authentication on resource-level elasticsearch_connection will be deprecated, which forces the usage of a provider that uses hardcoded credentials or a provider that depends the resource ec_deployment.

Using a hardcoded provider goes against the principle of using a single Elastic Cloud Terraform provider to configure multiple deployments that have Elasticsearch resources. Defining the the Elasticsearch authentication on resource level suits usage of the Elastic Cloud Terraform provider.

If a Terraform module that contains an Elastic Cloud deployment with Elasticsearch resources is destroyed, the Elasticsearch resources can't be deleted because the Elastic Stack Terraform provider is also destroyed in the same run (#509 (comment)).

Notice that the Elastic Stack provider is not configured, since we'll be using an elasticsearch_connection block
for each of our resources, to point to the Elastic Cloud deployment. This is because terraform can not configure providers that are dependent on one another. - https://github.com/elastic/terraform-provider-elasticstack/pull/16/files#diff-b9b7a6e1524a6af9ff3c316d95a6dd1fa5b95d95e130de3ed83228f34e8b4929R40-R41

This issue is related to #509, because authentication on resource-level has not been implemented for Kibana.

Describe the resource you would like to have implemented.
Don't remove Elasticsearch authentication on resource-level elasticsearch_connection and don't force the Elasticsearch connection via the provider configuration.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions