-
Notifications
You must be signed in to change notification settings - Fork 17
Closed
Closed
Copy link
Labels
Description
Affected modules
module vpc 8.0.0
Terraform CLI and Terraform provider versions
- Terraform version: 1.9
- Provider version: v1.79.0
Terraform output
2025/08/28 15:28:03 Terraform apply | Error: ---
2025/08/28 15:28:03 Terraform apply | id: terraform-48a43ea0
2025/08/28 15:28:03 Terraform apply | summary: 'CreateVPCDnsResolutionBindingWithContext failed: the provided token is not
2025/08/28 15:28:03 Terraform apply | authorized to connect the specified dns-resolution-binding (ID:r030-1126821b-a45e-4d76-b047-cfe6b70363ff)
2025/08/28 15:28:03 Terraform apply | in this account'
2025/08/28 15:28:03 Terraform apply | severity: error
2025/08/28 15:28:03 Terraform apply | resource: ibm_is_vpc
2025/08/28 15:28:03 Terraform apply | operation: create
2025/08/28 15:28:03 Terraform apply | component:
2025/08/28 15:28:03 Terraform apply | name: github.com/IBM-Cloud/terraform-provider-ibm
2025/08/28 15:28:03 Terraform apply | version: 1.79.0
Expected behavior
Vpc should be created after the authorization is created
Actual behavior
the vpc can't be created as the authorization with dnsBinding is still not in place
Steps to reproduce (including links and screen captures)
deploy a vpc hub and a vpc spoke with dns delegation in an account with no authorization (vpcBindingConnector between vpcs), using the module terraform-ibm-landingzone-vpc version 8.0.0
Anything else
maybe add a depend_on in the resource vpc to wait for authorization to be available before creating vpc
or make the source vpc id (spoke) open for all vpcs and specify the target which is the hub vpc id.
example:
resource "ibm_iam_authorization_policy" "iam-auth-vpc-dns" {
source_service_name = "is"
source_resource_type = "vpc"
target_service_name = "is"
target_resource_type = "vpc"
roles = ["DNS Binding Connector", "Viewer"]
}