-
Notifications
You must be signed in to change notification settings - Fork 246
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
failed to create AWS account: status: 404, body: {"message":"Not found"} #1948
Comments
@tristanburgess your message says to add a label, but I cannot add any labels. Can you? |
Hello @johncblandii, hope you are doing well!. Thanks for pointing this out, I will add the label and edit my message. It looks like the issue from your debug output is an invalid endpoint and stack ID for accessing the Grafana Cloud Provider API
Thus it seems to me that the Grafana provider specification needs to be adjusted in accordance with https://registry.terraform.io/providers/grafana/grafana/latest/docs#managing-cloud-provider and the stack ID output |
That id is just me editing it. The stack id is valid. I confirmed that. The code matches the suggested setup and the values are valid for each input. |
Oh and is there a way to get the cloud provider URL without calling the API? I'll verify if that's the issue, but it'd be better if creating a stack gave you that value as an output vs mixing in a manual step. |
Ok...the Should I submit a feature request to have that returned on the stack? |
Hello @johncblandii, no problem, glad to hear that you sorted it out. You may file a feature request, although it may be helpful to know that we are aware of this issue, we just don't currently have a timeline for fixing it, yet. In any case, your request can be used to help with prioritization, so it would be much appreciated. Thanks! |
I created this one: #1950. Thanks for the quick help, @tristanburgess. |
Terraform Version
1.5.6
Terraform Grafana Provider Version
3.14.1
Grafana Version
Cloud
Affected Resource(s)
Terraform Configuration Files
(multiple files are combined to show the core of the set-up and just what's necessary)
Expected Behavior
It should create the AWS connection as expected in Grafana.
Actual Behavior
Here is the debug view of the request (not much more info, tbh):
Steps to Reproduce
Important Factoids
I ran through the test on the "add a new scrape job" web version
/a/grafana-csp-app/aws/configuration/cloudwatch/create
and the connection auth validates, but I'm not 100% sure if that request is simply checking my user's ability to submit such a request or if it is actually testing the account.I went through the IAM role to see if that was being checked and it seems it isn't. I butchered the role (removed permissions) and it still showed a green check so I'm not 100% sure on what that part is doing.
I also verified the token had the proper permissions for integration management and stack reading. I tried the test with 2 different keys as well just to see if maybe I was losing my mind. lol
References
No response
The text was updated successfully, but these errors were encountered: