Skip to content

Commit 072dae3

Browse files
Increase timeouts (#199)
<!-- Thank you for submitting a Pull Request. Please fill out the template below.--> ## Overview/Summary Increase timeouts to help with ADO eventual consistency issue ## This PR fixes/adds/changes/removes 1. Azure/terraform-azurerm-avm-ptn-alz#157 2. Azure/ALZ-PowerShell-Module#269 ### Breaking Changes None ## Testing Evidence Please provide any testing evidence to show that your Pull Request works/fixes as described and planned (include screenshots, if appropriate). ## As part of this Pull Request I have - [x] Checked for duplicate [Pull Requests](https://github.com/Azure/alz-terraform-accelerator/pulls) - [x] Associated it with relevant [issues](https://github.com/Azure/alz-terraform-accelerator/issues), for tracking and closure. - [x] Ensured my code/branch is up-to-date with the latest changes in the `main` [branch](https://github.com/Azure/alz-terraform-accelerator/tree/main) - [x] Performed testing and provided evidence. - [x] Updated relevant and associated documentation.
1 parent d55348c commit 072dae3

File tree

1 file changed

+34
-10
lines changed
  • templates/platform_landing_zone/modules/management_groups

1 file changed

+34
-10
lines changed

templates/platform_landing_zone/modules/management_groups/locals.tf

Lines changed: 34 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,31 +14,55 @@ locals {
1414
} }
1515
} }
1616
default_retries = {
17-
policy_assignments = {
18-
error_message_regex = ["AuthorizationFailed", "The policy definition specified in policy assignment '.+' is out of scope"]
17+
management_groups = {
18+
error_message_regex = ["AuthorizationFailed"]
19+
}
20+
role_definitions = {
21+
error_message_regex = ["AuthorizationFailed"]
1922
}
2023
policy_definitions = {
2124
error_message_regex = ["AuthorizationFailed"]
2225
}
2326
policy_set_definitions = {
2427
error_message_regex = ["AuthorizationFailed"]
2528
}
29+
policy_assignments = {
30+
error_message_regex = ["AuthorizationFailed", "The policy definition specified in policy assignment '.+' is out of scope"]
31+
}
2632
policy_role_assignments = {
2733
error_message_regex = ["AuthorizationFailed", "ResourceNotFound"]
2834
}
35+
hierarchy_settings = {
36+
error_message_regex = ["AuthorizationFailed"]
37+
}
38+
subscription_placement = {
39+
error_message_regex = ["AuthorizationFailed"]
40+
}
2941
}
3042
default_timeouts = {
31-
policy_assignments = {
32-
create = "10m"
43+
management_group = {
44+
create = "60m"
45+
read = "60m"
3346
}
34-
policy_definitions = {
35-
create = "10m"
47+
role_definition = {
48+
create = "60m"
49+
read = "60m"
3650
}
37-
policy_set_definitions = {
38-
create = "10m"
51+
policy_assignment = {
52+
create = "60m"
53+
read = "60m"
3954
}
40-
policy_role_assignments = {
41-
create = "10m"
55+
policy_definition = {
56+
create = "60m"
57+
read = "60m"
58+
}
59+
policy_set_definition = {
60+
create = "60m"
61+
read = "60m"
62+
}
63+
policy_role_assignment = {
64+
create = "60m"
65+
read = "60m"
4266
}
4367
}
4468
}

0 commit comments

Comments
 (0)