-
Notifications
You must be signed in to change notification settings - Fork 346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloudwatch_metric_alarm - Existing alarms always report 'changed' even when no changes have been made #1439
Comments
softwarefactory-project-zuul bot
pushed a commit
that referenced
this issue
Mar 28, 2023
…1440) Don't consider prop 'StateTransitionedTimestamp' in change detection SUMMARY Remove property 'StateTransitionedTimestamp' from the list of props when determining if an alarm has changed and needs to be create/updated. Fixes #1439 ISSUE TYPE Bugfix Pull Request COMPONENT NAME cloudwatch-metric-alarm ADDITIONAL INFORMATION See issue #1439 for additional details. Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis
alinabuzachis
pushed a commit
to alinabuzachis/amazon.aws
that referenced
this issue
Apr 26, 2023
…nsible-collections#1440) Don't consider prop 'StateTransitionedTimestamp' in change detection SUMMARY Remove property 'StateTransitionedTimestamp' from the list of props when determining if an alarm has changed and needs to be create/updated. Fixes ansible-collections#1439 ISSUE TYPE Bugfix Pull Request COMPONENT NAME cloudwatch-metric-alarm ADDITIONAL INFORMATION See issue ansible-collections#1439 for additional details. Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis
softwarefactory-project-zuul bot
pushed a commit
that referenced
this issue
Apr 26, 2023
…1440) (#1480) [manual backport stable-5] Don't consider prop 'StateTransitionedTimestamp' in change detection (#1440) SUMMARY Remove property 'StateTransitionedTimestamp' from the list of props when determining if an alarm has changed and needs to be create/updated. Fixes #1439 ISSUE TYPE Bugfix Pull Request COMPONENT NAME cloudwatch-metric-alarm ADDITIONAL INFORMATION See issue #1439 for additional details. Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis SUMMARY ISSUE TYPE Bugfix Pull Request Docs Pull Request Feature Pull Request New Module Pull Request COMPONENT NAME ADDITIONAL INFORMATION Reviewed-by: Mark Chappell
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
When running CloudWatch metric alarm playbooks, existing alarms always report 'changed' even when no changes have been made to the alarm settings/props.
After digging into the cloudwatch_metric_alarm module code, looks like the prop StateTransitionedTimestamp is included when determining any changes when it most likely should not be. (Note: other state props are already excluded - 'StateValue', 'StateReason', 'StateReasonData', 'StateUpdatedTimestamp')
Issue Type
Bug Report
Component Name
cloudwatch-metric-alarm
Ansible Version
Collection Versions
AWS SDK versions
Configuration
CONFIG_FILE() = None
OS / Environment
Windows 11 Pro / WSL - Ubuntu 22.04.2 LTS
Steps to Reproduce
Steps to reproduce:
Expected Results
After the initial run of above playbook, future runs should report no changes (changed=0) unless settings/props are modified.
Actual Results
After initial playbook run, future playbook runs always report that changes are necessary and makes AWS call to create alarm again.
Code of Conduct
The text was updated successfully, but these errors were encountered: