Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Enhancement]: Add configurable timeouts for aws_organizations_account #40894

Closed
erpel opened this issue Jan 13, 2025 · 2 comments · Fixed by #41059
Closed

[Enhancement]: Add configurable timeouts for aws_organizations_account #40894

erpel opened this issue Jan 13, 2025 · 2 comments · Fixed by #41059
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/organizations Issues and PRs that pertain to the organizations service. timeouts Pertains to timeout increases.
Milestone

Comments

@erpel
Copy link
Contributor

erpel commented Jan 13, 2025

Description

When deleting an aws_organizations_account it can take more than the default 5 minutes. Sometimes it does not.
I'm experiencing this with the close_on_deletion = true setting.

Being able to define a slightly longer timeout might allow completing terraform runs to remove accounts without having to retry. Usually on a retry a few minutes later, all is good.

* Failed to execute "terraform apply -auto-approve -input=false" in .
  ╷
  │ Error: waiting for AWS Organizations Account (123…) delete: timeout while waiting for resource to be gone (last state: 'ACTIVE', timeout: 5m0s)
  │ 
  │ 
  ╵


Affected Resource(s) and/or Data Source(s)

  • aws_organizations_account

Potential Terraform Configuration

resource "aws_organizations_account" "sometest" {

  name      = "sometest"
  email     = "aws-accounts+sometest@….com"
  role_name = "account-bootstrap-role"
  parent_id = "foo"
  close_on_deletion = true
  
  timeouts {
    delete = "20m"
  }

}

References

No response

Would you like to implement a fix?

None

@erpel erpel added the enhancement Requests to existing resources that expand the functionality or scope. label Jan 13, 2025
Copy link

Community Note

Voting for Prioritization

  • Please vote on this issue by adding a 👍 reaction to the original post to help the community and maintainers prioritize this request.
  • Please see our prioritization guide for information on how we prioritize.
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.

Volunteering to Work on This Issue

  • If you are interested in working on this issue, please leave a comment.
  • If this would be your first contribution, please review the contribution guide.

@github-actions github-actions bot added service/organizations Issues and PRs that pertain to the organizations service. needs-triage Waiting for first response or review from a maintainer. labels Jan 13, 2025
@justinretzolk justinretzolk added timeouts Pertains to timeout increases. and removed needs-triage Waiting for first response or review from a maintainer. labels Jan 13, 2025
Copy link

Warning

This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them.

Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed.

@github-actions github-actions bot added this to the v5.85.0 milestone Jan 24, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/organizations Issues and PRs that pertain to the organizations service. timeouts Pertains to timeout increases.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants