echoing-kite-20563
12/03/2025, 11:25 PMlate-chef-72896
12/04/2025, 7:08 AMadorable-beach-54012
12/04/2025, 8:50 PMfull-oxygen-23886
12/08/2025, 5:06 AMpulumi up multiple times with different configurations, but it seems nice to be able to do all in one go. 🙂fancy-eve-82724
12/08/2025, 1:53 PMWARNING: All log messages before absl::InitializeLog() is called are written to STDERR
Other threads are currently calling into gRPC, skipping fork() handlersmodern-spring-15520
12/08/2025, 6:58 PMagreeable-ram-69944
12/08/2025, 10:44 PMhigh-grass-3103
12/09/2025, 3:01 PMpulumi up . Not sure if it's a problem with the provider or somewhere between it and pulumiancient-apartment-93560
12/09/2025, 3:55 PMbrave-painter-79367
12/10/2025, 1:53 AMdazzling-sundown-39670
12/10/2025, 1:38 PMfast-sandwich-30809
12/10/2025, 8:20 PMboundless-waiter-17971
12/12/2025, 4:00 PMagreeable-ram-69944
12/12/2025, 7:30 PMfamous-ambulance-44173
12/15/2025, 12:00 PMwhite-answer-67284
12/15/2025, 3:23 PMmodern-spring-15520
12/15/2025, 5:04 PMcurved-jordan-5346
12/16/2025, 2:26 AMnice-toothbrush-68985
12/16/2025, 11:24 AMrefined-rose-69456
12/17/2025, 3:48 PMbland-monitor-37952
12/17/2025, 4:04 PMapp:version in our committed config files, the deployment pipeline just uses pulumi up --config app:version=${COMMIT_SHA}. This works fine. You can also preview the potential changes in the same way via pulumi preview.
However, a lot of other commands we might want to run, which would normally be manual for when things have gone wrong rather than driven by CI, both
• Require all config variables to be specified.
• Don't accept --config as a valid CLI parameter.
e.g.
$ pulumi destroy
error: validating stack config: Stack 'test-uk1' is missing configuration value 'app:version'
$ pulumi destroy --config app:version=foo
error: unknown flag: --config
So you end up having to set a 'dummy' value in the configuration file temporarily to be able to run those commands. The same seems to be true for pulumi refresh, for example. Is there any way around this? Should I raise a ticket about it? It feels like --config should be a globally-valid parameter for any pulumi action which requires the config to be present (e.g. pulumi state export doesn't actually care that the config is not complete as it's not attempting to run the app at all)nice-toothbrush-68985
12/17/2025, 6:21 PMManagedNodeGroup and NodeGroupV2 (using python)
I want to add an extra security group from a stack reference, but the node groups require the pulumi_aws.ec2.SecurityGroup class, but a stack reference serialize the class as dict,
but even when using aws.ec2.get_security_group_output(id=stack_ref_sg['id']) or aws.ec2.get_security_group(id=stack_ref_sg['id']) as input for extra_node_security_groups the program still breaks..
How can I pass a pre-existing security group to the module?white-answer-67284
12/17/2025, 9:50 PMv3.212.0 . I'm struggling with the same issue this person had at the begining of the year - where even though the latest release of the SDK has my fix, sdks are generated via pulumi package add terraform-provider ... referencing an older version in the go.mod file that does not have my fix. This results in needing to communicate additional steps to developers for local development or having ad-hoc steps during CI
Thoughts on patching the codegen tool to bump the version of the sdk in the go.mod file to v3.212.0?gorgeous-terabyte-65363
12/18/2025, 5:50 PMmodern-spring-15520
12/22/2025, 4:36 PMfull-nest-77090
12/23/2025, 9:52 AMnice-toothbrush-68985
12/23/2025, 4:20 PMunable to validate AWS credentials error during pulumi deployment of a stack with newly added Deployment Settings (python)
I was expecting pulumi deployments to use the ESC environment: configured in the pulumi.<stack>.yaml
but while writing this post to ask for help I actually found out my original issue 💪 but I have another 😞
It turns out that having config.aws:profile in pulumi.<stack>.yaml can interfere with Pulumi Deployments loading of ESC environment,
my workflow was to do local infra development, with valid local aws session, and now I started working on getting the stack automated with deployments.
thus I was using aws:profile to target a specific profile in my ~/.aws/config, I fixed the error by commenting out this 'local' configuration, and letting pulumi use environment with ESC without targeting a profile..
But now I cannot run pulumi preview locally to iterate fast on new code before committing to a side-branch,
I'm now getting unable to validate AWS credentials. locally, how can I use the esc environment and use the dynamic oidc based credentials locally?flaky-painter-27439
12/24/2025, 5:11 PMincalculable-plumber-94290
12/27/2025, 5:14 PMjolly-traffic-63773
12/31/2025, 1:13 AM