https://pulumi.com logo
Join the conversationJoin Slack
Channels
announcements
automation-api
aws
azure
blog-posts
built-with-pulumi
cloudengineering
cloudengineering-support
content-share
contribex
contribute
docs
dotnet
finops
general
getting-started
gitlab
golang
google-cloud
hackathon-03-19-2020
hacktoberfest
install
java
jobs
kubernetes
learn-pulumi-events
linen
localstack
multi-language-hackathon
office-hours
oracle-cloud-infrastructure
plugin-framework
pulumi-cdk
pulumi-crosscode
pulumi-deployments
pulumi-kubernetes-operator
pulumi-service
pulumiverse
python
registry
status
testingtesting123
testingtesting321
typescript
welcome
workshops
yaml
Powered by Linen
aws
  • f

    flat-insurance-25294

    01/03/2020, 12:42 PM
    It seems like it.
  • f

    flat-insurance-25294

    01/03/2020, 12:44 PM
    @broad-dog-22463 Do you got the actual code for that blog post - it’s hard to follow when it’s so split up.
  • b

    broad-dog-22463

    01/03/2020, 12:45 PM
    There is a link in the Wrapping Up section
  • f

    flat-insurance-25294

    01/03/2020, 1:00 PM
    @broad-dog-22463 What I am confused about it this part https://github.com/pulumi/examples/blob/b44ff00deaa30fa2a601ef809f4c2bbe5eb08bd8/aws-ts-static-website/index.ts#L129
  • f

    flat-insurance-25294

    01/03/2020, 1:00 PM
    @broad-dog-22463 How can you set the config by assigning the variable?
  • f

    flat-insurance-25294

    01/03/2020, 1:00 PM
    And then read it like stackConfig.get(“certificateArn”)
  • b

    broad-dog-22463

    01/03/2020, 1:01 PM
    so there is an assignment you are missing on line 83
  • b

    broad-dog-22463

    01/03/2020, 1:01 PM
    let certificateArn: pulumi.Input<string> = config.certificateArn!;
  • b

    broad-dog-22463

    01/03/2020, 1:02 PM
    that means that certificateArn is the value from config if it exists
  • b

    broad-dog-22463

    01/03/2020, 1:02 PM
    then you can reassign it later if necessary
  • f

    flat-insurance-25294

    01/03/2020, 1:07 PM
    But that config isn’t pulumi.Config
  • f

    flat-insurance-25294

    01/03/2020, 1:07 PM
    It’s just a map/object
  • f

    flat-insurance-25294

    01/03/2020, 1:07 PM
    https://github.com/pulumi/examples/blob/master/aws-ts-static-website/index.ts#L20
  • f

    flat-insurance-25294

    01/03/2020, 1:07 PM
    Pulumi docs claim there is setters for Configs, but looking at the Config Interface, I can’t see them at all.
  • f

    flat-insurance-25294

    01/03/2020, 1:09 PM
    I tried doing that myself
    let stackConfig = new pulumi.Config();
    var x = stackConfig.get("sample");
    x = "adding_sample";
    It doesn’t write the config.
  • f

    flat-insurance-25294

    01/03/2020, 1:27 PM
    @broad-dog-22463 That doesn’t seem to write to the config, in fact looking at the Config interface (typescript) I see now way to actually write configs?
  • f

    flat-insurance-25294

    01/03/2020, 1:28 PM
    • The programming model offers a 
    Config
     object with various getters and setters for retrieving values.
  • f

    flat-insurance-25294

    01/03/2020, 2:53 PM
    How can I get the
    arn
    for aws.route53.Zone in case I want grant access to a few users.
  • f

    flat-insurance-25294

    01/04/2020, 3:59 PM
    @white-balloon-205 I found some issues in you docs related to Route53 https://www.pulumi.com/docs/reference/pkg/nodejs/pulumi/aws/route53/#public-subdomain-zone This won’t actually work for several reasons. For starters the name used for
    Zone
    will contain autogenerated numbers. And the name for
    Record
    will contain other auto generated numbers that won’t refer to the sub-hosted zone. The way to make it work is to use
    name:
    key as the argument.
    w
    • 2
    • 21
  • b

    big-caravan-87850

    01/06/2020, 10:49 PM
    are there any plans to support locking for the s3 backend? There's been no response on this PR for a few months: https://github.com/pulumi/pulumi/pull/2697
    w
    s
    c
    • 4
    • 5
  • f

    flat-insurance-25294

    01/11/2020, 3:58 PM
    Hmm, we’re not using iam Roles and will not for a while. Instead our Application accesses S3, Cloudfront and RDS via AccessKey. My question is, for a multi stage environment (dev, staging, prod, etc) Is it better to attach the policy to a group and create a user for said group E.g a BackendStagingGroup and a BackendApplicationUser Or is a user + policy sufficient without the group?
  • f

    flat-insurance-25294

    01/12/2020, 2:25 AM
    Is there a way to enable this in CloudFront?
  • f

    flat-insurance-25294

    01/12/2020, 2:27 AM
    I found it https://github.com/pulumi/pulumi-aws/blob/master/sdk/nodejs/cloudfront/originAccessIdentity.ts
  • l

    late-printer-99022

    01/12/2020, 6:37 AM
    getting error in TypeScript,
    export const vpcPublicSubnetIds = vpc.publicSubnetIds.join(',');
    Calling [toString] on an [Output<T>] is not supported.\n\nTo get the value of an Output<T> as an Output<string> consider either:\n1: o.apply(v => `prefix${v}suffix`)\n2: pulumi.interpolate `prefix${v}suffix`\n\nSee <https://pulumi.io/help/outputs> for more details.\nThis function may throw in a future version of @pulumi/pulumi.,Calling [toString] on an [Output<T>] is not supported.\n\nTo get the value of an Output<T> as an Output<string> consider either:\n1: o.apply(v => `prefix${v}suffix`)\n2: pulumi.interpolate `prefix${v}suffix`\n\nSee <https://pulumi.io/help/outputs> for more details.\nThis function may throw in a future version of @pulumi/pulumi."
    w
    f
    • 3
    • 3
  • f

    flat-insurance-25294

    01/13/2020, 7:51 AM
    @white-balloon-205 Is there any guide of setting up a bastion(s)/jump host(s) for accessing EKS with workers in private subnets over several that’s accessible by iAM users in a certain group but also for accessing kubectl? Right now we’re doing public control plane but want to get away from that. Is
    UserLoginProfileArgs.pgpKey
    the ssh key?
    w
    • 2
    • 2
  • f

    flat-insurance-25294

    01/13/2020, 9:15 AM
    Related https://github.com/pulumi/pulumi-awsx/issues/25
  • p

    proud-lawyer-63233

    01/13/2020, 3:14 PM
    I'm setting up a Lambda function with API Gateway. I'd like to use the resulting API url (eg
    endpoint.url
    ) as an environment variable within the Lambda. However, the lambda is created at a point where I don't yet have the API gateway url. How might I get around this?
    const myLambda = new aws.lambda.Function("my-handler", {
      runtime: aws.lambda.Python3d7Runtime,
      code: new pulumi.asset.FileArchive("my-package.zip"),
      handler: "handler.lambda_handler",
      environment: {
        variables: {
          ENV_VARIABLE_1: 'foo',
        },
      },
    })
    
    const endpoint = new awsx.apigateway.API("my-gateway", {
      routes: [{
          path: "/{proxy+}",
          method: "ANY",
          eventHandler: aws.lambda.Function.get("my-lambda", myLambda.id),
      }],
    })
    w
    • 2
    • 1
  • r

    rhythmic-camera-25993

    01/13/2020, 5:43 PM
    just wanna drop in to say that the practices in the awsx package for Fargate Services have been hugely helpful in aiding my understanding of how the pieces all go together. in just a couple days I've got containers running behind ALBs that have logs, use secrets, are locked down tight in terms of network access and permissions. bravo to all!
    😛artypus: 3
    🎉 2
    💯 1
  • f

    flat-insurance-25294

    01/13/2020, 9:59 PM
    @rhythmic-camera-25993 Are you using env variables as secrets and did you figure out how to do service discovery (like headless service in k8)?
  • f

    flat-insurance-25294

    01/13/2020, 10:00 PM
    What’s the point of plan “aurora” here?
    *export* declare type EngineType *=* "aurora" *|* "aurora-mysql" *|* "aurora-postgresql";
    Seems like a weird type.
Powered by Linen
Title
f

flat-insurance-25294

01/13/2020, 10:00 PM
What’s the point of plan “aurora” here?
*export* declare type EngineType *=* "aurora" *|* "aurora-mysql" *|* "aurora-postgresql";
Seems like a weird type.
View count: 1