great-sunset-355
12/17/2021, 3:27 PMgit tag
for things to happen.limited-electrician-71574
12/20/2021, 6:31 PMevent_pattern
parameter in aws.cloudwatch.EventRule
must be a string. The Glue job configured has a random suffix attached to the resource name. How do I specify the job name in the event_pattern
given that gluejob.name
is an Output
type? I'm coding w/ Python. Thanks!colossal-market-93154
12/21/2021, 1:34 PMnew aws.ec2.RouteTable("main-route-table", {
routes: [
{
cidrBlock: "172.30.0.0/16",
localGatewayId: "local", // THIS PART HERE
},
All of the options for routes parameter are asking for ids:
error creating route: one of `carrier_gateway_id, egress_only_gateway_id, gateway_id, instance_id, local_gateway_id, nat_gateway_id, network_interface_id, transit_gateway_id, vpc_endpoint_id, vpc_peering_connection_id` must be specified
ancient-cricket-42076
12/22/2021, 4:48 PMelegant-kangaroo-93165
12/23/2021, 4:34 AMglamorous-australia-21342
12/23/2021, 3:41 PM$ pulumi import aws:iam/openIdConnectProvider:OpenIdConnectProvider stack-oidcProvider arn:aws:iam::<ACCOUNT_ID>:oidc-provider/oidc.eks.us-east-2.amazonaws.com/id/<OIDC_UID>
Previewing import (stack/name)
Type Name Plan Info
pulumi:pulumi:Stack company-stack 1 error
= └─ aws:iam:OpenIdConnectProvider stack-oidcProvider import 2 errors
Diagnostics:
aws:iam:OpenIdConnectProvider (stack-oidcProvider):
error: aws:iam/openIdConnectProvider:OpenIdConnectProvider resource 'stack-oidcProvider' has a problem: "url" has to use HTTPS scheme (i.e. begin with https://). Examine values at 'OpenIdConnectProvider.Url'.
error: Preview failed: one or more inputs failed to validate
pulumi:pulumi:Stack (stack-stack):
error: preview failed
ancient-cricket-42076
12/23/2021, 8:21 PMCreating load balancer failed Reason: At least two subnets in two different Availability Zones must be specified (Service: AmazonElasticLoadBalancing; Status Code: 400; Error Code: ValidationError; Request ID: 7cc7ae7e-17dc-4361-8fec-8b0b0bb5df96; Proxy: null)
purple-megabyte-83002
12/25/2021, 3:01 PMOutput<string>
that i’d like to input in a string
field, how should I do ?purple-megabyte-83002
12/25/2021, 3:04 PMconst jwtSecretParam = new aws.ssm.Parameter('JWT_SECRET', {
type: 'SecureString',
value: cfg.requireSecret('JWT_SECRET'),
});
const service = new awsx.ecs.FargateService('api', {
desiredCount: 2,
taskDefinitionArgs: {
cpu: '256',
memory: '512',
container: {
secrets: [
{
name: 'JWT_SECRET',
valueFrom: jwtSecretParam.arn,
},
],
},
},
});
purple-megabyte-83002
12/25/2021, 3:05 PMjwtSecretParam.arn
is a Output<string>
purple-megabyte-83002
12/25/2021, 3:06 PMsecrets[].valueFrom
needs a string
rhythmic-photographer-84959
12/28/2021, 3:53 AMnew aws.glue.CatalogTable(`${databaseName}.${tableName}.view`, {
databaseName: databaseName,
name: `${tableName}`,
tableType: 'VIRTUAL_VIEW',
parameters: {
comment: 'Presto View',
presto_view: 'true',
},
retention: 0,
viewExpandedText: '/* Presto View */',
viewOriginalText: '/* Presto View: eyJvcmlnaW5hbFNxbCI6IlNFTEVDVFxuICBpZFxuLCBwbGF0Zm9ybV9yb29tX2lkXG4sIHBsYXRmb3JtX3VzZXJfaWRcbiwgZXZlbnRfdHlwZVxuLCByZWNlaXZlZFxuLCBDQVNUKFJPVyAoXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQucGxhdGZvcm0nKSwgUk9XIChcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5wYXJhbXMuYWNjZXNzVG9rZW4nKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQucGFyYW1zLmNoYW5uZWxTZWNyZXQnKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQucGFyYW1zLnVzZVVybFNob3J0ZW5lcicpKSwgUk9XIChcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC51c2VyLmhhc2hlZFVzZXJJZCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC51c2VyLnVzZXJJZCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC51c2VyLmFwcElkJyksIFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLnVzZXIuY2xpZW50SWQnKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQudXNlci50eXBlJyksIFJPVyAoXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQudXNlci5wcm9maWxlLnBpY3R1cmVVUkwnKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIoYm9keSwgJyQudXNlci5wcm9maWxlLnVuaXF1ZUlEJyksIFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLnVzZXIucHJvZmlsZS5uYW1lJykpKSwgUk9XIChST1cgKFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLm1lc3NhZ2UuaW1hZ2UucHJldmlld0ltYWdlVXJsJyksIFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLm1lc3NhZ2UuaW1hZ2Uub3JpZ2luYWxDb250ZW50VXJsJyksIFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLm1lc3NhZ2UuaW1hZ2UudHlwZScpKSwgUk9XIChcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5tZXNzYWdlLnRleHQudGV4dCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5tZXNzYWdlLnRleHQudHlwZScpKSwgUk9XIChcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5tZXNzYWdlLnZpZGVvLnByZXZpZXdJbWFnZVVybCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5tZXNzYWdlLnZpZGVvLm9yaWdpbmFsQ29udGVudFVybCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC5tZXNzYWdlLnZpZGVvLnR5cGUnKSkpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihib2R5LCAnJC50eXBlJyksIFwianNvbl9leHRyYWN0X3NjYWxhclwiKGJvZHksICckLnRpbWVzdGFtcCcpKSBBUyByb3cocGxhdGZvcm0gdmFyY2hhcixwYXJhbXMgcm93KGFjY2Vzc3Rva2VuIHZhcmNoYXIsY2hhbm5lbHNlY3JldCB2YXJjaGFyLHVzZXVybHNob3J0ZW5lciB2YXJjaGFyKSx1c2VyIHJvdyhoYXNoZWR1c2VyaWQgdmFyY2hhcix1c2VyaWQgdmFyY2hhcixhcHBpZCB2YXJjaGFyLGNsaWVudGlkIHZhcmNoYXIsdHlwZSB2YXJjaGFyLHByb2ZpbGUgcm93KHBpY3R1cmV1cmwgdmFyY2hhcix1bmlxdWVpZCB2YXJjaGFyLG5hbWUgdmFyY2hhcikpLG1lc3NhZ2Ugcm93KGltYWdlIHJvdyhwcmV2aWV3aW1hZ2V1cmwgdmFyY2hhcixvcmlnaW5hbGNvbnRlbnR1cmwgdmFyY2hhcix0eXBlIHZhcmNoYXIpLHRleHQgcm93KHRleHQgdmFyY2hhcix0eXBlIHZhcmNoYXIpLHZpZGVvIHJvdyhwcmV2aWV3aW1hZ2V1cmwgdmFyY2hhcixvcmlnaW5hbGNvbnRlbnR1cmwgdmFyY2hhcix0eXBlIHZhcmNoYXIpKSx0eXBlIHZhcmNoYXIsXCJ0aW1lc3RhbXBcIiBpbnRlZ2VyKSkgYm9keVxuLCAoQ0FTRSBXSEVOIChcImxlbmd0aFwiKFwidGltZXN0YW1wXCIpID0gMjIpIFRIRU4gXCJkYXRlX2Zvcm1hdFwiKFwiZGF0ZV9wYXJzZVwiKFwiY29uY2F0XCIoXCJ0aW1lc3RhbXBcIiwgJzAwJyksICclWS0lbS0lZCAlSDolaTolcyswMDAwJykgQVQgVElNRSBaT05FICdBc2lhL1Rva3lvJywgJyVZLSVtLSVkICVIOiVpOiVzLiVmICswOTAwJykgRUxTRSBcImRhdGVfZm9ybWF0XCIoXCJkYXRlX3BhcnNlXCIoXCJjb25jYXRcIihcInRpbWVzdGFtcFwiLCAnMDAnKSwgJyVZLSVtLSVkICVIOiVpOiVzLiVmKzAwMDAnKSBBVCBUSU1FIFpPTkUgJ0FzaWEvVG9reW8nLCAnJVktJW0tJWQgJUg6JWk6JXMuJWYgKzA5MDAnKSBFTkQpIFwidGltZXN0YW1wXCJcbiwgQ0FTVChST1cgKFwianNvbl9leHRyYWN0X3NjYWxhclwiKG5lcl9yZXN1bHRzLCAnJC5lbW9qaScpLCBBUlJBWVtST1coXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIobmVyX3Jlc3VsdHMsICckLm5lclswXS5sYWJlbCcpLCBcImpzb25fZXh0cmFjdF9zY2FsYXJcIihuZXJfcmVzdWx0cywgJyQubmVyWzBdLnRleHQnKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIobmVyX3Jlc3VsdHMsICckLm5lclswXS5lbmQnKSwgXCJqc29uX2V4dHJhY3Rfc2NhbGFyXCIobmVyX3Jlc3VsdHMsICckLm5lclswXS5zdGFydCcpKV0sIFwianNvbl9leHRyYWN0X3NjYWxhclwiKG5lcl9yZXN1bHRzLCAnJC5kaWFsb2cnKSkgQVMgcm93KGVtb2ppIHZhcmNoYXIsbmVyIGFycmF5KHJvdyhsYWJlbCB2YXJjaGFyLHRleHQgdmFyY2hhcixcImVuZFwiIGludGVnZXIsc3RhcnQgaW50ZWdlcikpLGRpYWxvZyB2YXJjaGFyKSkgbmVyX3Jlc3VsdHNcbiwgbmVyX3N0YXR1c1xuLCBzdWdnZXN0X3N0YXR1c1xuLCBcImRhdGVfZm9ybWF0XCIoXCJkYXRlX3BhcnNlXCIoXCJjb25jYXRcIihjcmVhdGVkX2F0LCAnMDAnKSwgJyVZLSVtLSVkICVIOiVpOiVzLiVmKzAwMDAnKSBBVCBUSU1FIFpPTkUgJ0FzaWEvVG9reW8nLCAnJVktJW0tJWQgJUg6JWk6JXMuJWYgKzA5MDAnKSBjcmVhdGVkX2F0XG4sIFwiZGF0ZV9mb3JtYXRcIihcImRhdGVfcGFyc2VcIihcImNvbmNhdFwiKHVwZGF0ZWRfYXQsICcwMCcpLCAnJVktJW0tJWQgJUg6JWk6JXMuJWYrMDAwMCcpIEFUIFRJTUUgWk9ORSAnQXNpYS9Ub2t5bycsICclWS0lbS0lZCAlSDolaTolcy4lZiArMDkwMCcpIHVwZGF0ZWRfYXRcbiwgY29tcGxldGVkXG4sIGRlbGV0ZWRcbkZST01cbiAgY2hhdF9wb3N0Z3Jlcy5yZHNfZXhwb3J0ZWRfcGxhdGZvcm1fZXZlbnRzXG4iLCJjYXRhbG9nIjoiYXdzZGF0YWNhdGFsb2ciLCJzY2hlbWEiOiJjaGF0X3Bvc3RncmVzIiwiY29sdW1ucyI6W3sibmFtZSI6ImlkIiwidHlwZSI6ImludGVnZXIifSx7Im5hbWUiOiJwbGF0Zm9ybV9yb29tX2lkIiwidHlwZSI6ImludGVnZXIifSx7Im5hbWUiOiJwbGF0Zm9ybV91c2VyX2lkIiwidHlwZSI6ImludGVnZXIifSx7Im5hbWUiOiJldmVudF90eXBlIiwidHlwZSI6InZhcmNoYXIifSx7Im5hbWUiOiJyZWNlaXZlZCIsInR5cGUiOiJib29sZWFuIn0seyJuYW1lIjoiYm9keSIsInR5cGUiOiJyb3coXCJwbGF0Zm9ybVwiIHZhcmNoYXIsXCJwYXJhbXNcIiByb3coXCJhY2Nlc3N0b2tlblwiIHZhcmNoYXIsXCJjaGFubmVsc2VjcmV0XCIgdmFyY2hhcixcInVzZXVybHNob3J0ZW5lclwiIHZhcmNoYXIpLFwidXNlclwiIHJvdyhcImhhc2hlZHVzZXJpZFwiIHZhcmNoYXIsXCJ1c2VyaWRcIiB2YXJjaGFyLFwiYXBwaWRcIiB2YXJjaGFyLFwiY2xpZW50aWRcIiB2YXJjaGFyLFwidHlwZVwiIHZhcmNoYXIsXCJwcm9maWxlXCIgcm93KFwicGljdHVyZXVybFwiIHZhcmNoYXIsXCJ1bmlxdWVpZFwiIHZhcmNoYXIsXCJuYW1lXCIgdmFyY2hhcikpLFwibWVzc2FnZVwiIHJvdyhcImltYWdlXCIgcm93KFwicHJldmlld2ltYWdldXJsXCIgdmFyY2hhcixcIm9yaWdpbmFsY29udGVudHVybFwiIHZhcmNoYXIsXCJ0eXBlXCIgdmFyY2hhciksXCJ0ZXh0XCIgcm93KFwidGV4dFwiIHZhcmNoYXIsXCJ0eXBlXCIgdmFyY2hhciksXCJ2aWRlb1wiIHJvdyhcInByZXZpZXdpbWFnZXVybFwiIHZhcmNoYXIsXCJvcmlnaW5hbGNvbnRlbnR1cmxcIiB2YXJjaGFyLFwidHlwZVwiIHZhcmNoYXIpKSxcInR5cGVcIiB2YXJjaGFyLFwidGltZXN0YW1wXCIgaW50ZWdlcikifSx7Im5hbWUiOiJ0aW1lc3RhbXAiLCJ0eXBlIjoidmFyY2hhciJ9LHsibmFtZSI6Im5lcl9yZXN1bHRzIiwidHlwZSI6InJvdyhcImVtb2ppXCIgdmFyY2hhcixcIm5lclwiIGFycmF5KHJvdyhcImxhYmVsXCIgdmFyY2hhcixcInRleHRcIiB2YXJjaGFyLFwiZW5kXCIgaW50ZWdlcixcInN0YXJ0XCIgaW50ZWdlcikpLFwiZGlhbG9nXCIgdmFyY2hhcikifSx7Im5hbWUiOiJuZXJfc3RhdHVzIiwidHlwZSI6ImludGVnZXIifSx7Im5hbWUiOiJzdWdnZXN0X3N0YXR1cyIsInR5cGUiOiJpbnRlZ2VyIn0seyJuYW1lIjoiY3JlYXRlZF9hdCIsInR5cGUiOiJ2YXJjaGFyIn0seyJuYW1lIjoidXBkYXRlZF9hdCIsInR5cGUiOiJ2YXJjaGFyIn0seyJuYW1lIjoiY29tcGxldGVkIiwidHlwZSI6ImJvb2xlYW4ifSx7Im5hbWUiOiJkZWxldGVkIiwidHlwZSI6ImludGVnZXIifV19 */',
storageDescriptor: {
parameters: {},
compressed: false,
numberOfBuckets: 0,
storedAsSubDirectories: false,
serDeInfo: {
parameters: {},
},
columns: [
{
name: 'id',
type: 'int'
},
{
name: 'platform_room_id',
type: 'int'
},
{
name: 'platform_user_id',
type: 'int',
},
{
name: 'event_type',
type: 'string',
},
{
name: 'received',
type: 'boolean',
},
{
name: 'body',
type: 'struct<platform:string,params:struct<accesstoken:string,channelsecret:string,useurlshortener:string>,user:struct<hasheduserid:string,userid:string,appid:string,clientid:string,type:string,profile:struct<pictureurl:string,uniqueid:string,name:string>>,message:struct<image:struct<previewimageurl:string,originalcontenturl:string,type:string>,text:struct<text:string,type:string>,video:struct<previewimageurl:string,originalcontenturl:string,type:string>>,type:string,timestamp:int>'
},
{
name: 'timestamp',
type: 'string'
},
{
name: 'ner_results',
type: 'struct<emoji:string,ner:array<struct<label:string,text:string,end:int,start:int>>,dialog:string>'
},
{
name: 'ner_status',
type: 'int'
},
{
name: 'suggest_status',
type: 'int'
},
{
name: 'created_at',
type: 'string'
},
{
name: 'updated_at',
type: 'string'
},
{
name: 'completed',
type: 'boolean'
},
{
name: 'deleted',
type: 'int'
},
],
},
}
then I tried SQL on athena.
returned error like this.
HIVE_METASTORE_ERROR: Required Table SerDe information is not populated. (Service: null; Status Code: 0; Error Code: null; Request ID: null; Proxy: null)
How should I do resolve error?glamorous-australia-21342
12/28/2021, 4:34 PMhigh-grass-3103
12/30/2021, 7:22 AMkind-carpenter-52856
01/04/2022, 3:02 PM* Error launching source instance: InvalidIPAddress.InUse: Address 172.16.10.20 is in use.
status code: 400, request id: eb5c9b5a-970f-472b-9092-f1e82a3760a3
But if i try to change ip address, pulumi can update itmagnificent-lifeguard-15082
01/05/2022, 8:13 PMterraform-aws-modules/iam/aws
? Eg. A package with some nice ResourceComponent abstractions like AssumableRole
, Group
etc.tall-beard-99429
01/06/2022, 12:42 PMlatest
on the EKS addons, however, I get the following error:
error: aws:eks/addon:Addon resource 'vpc-cni' has a problem: invalid value for addon_version (must follow semantic version format). Examine values at 'Addon.AddonVersion'.
But the documentation on EKS seems to not agree with this, is this a bug or an eksctl
specific feature? https://docs.aws.amazon.com/eks/latest/userguide/managing-vpc-cni.htmlagreeable-processor-5681
01/06/2022, 4:36 PMconst ecrRepo = new aws.ecr.Repository(
_.kebabCase(`${projectName} Repository`),
{
tags: {
name: _.kebabCase(`${projectName} repository`),
},
imageTagMutability: "MUTABLE",
imageScanningConfiguration: {
scanOnPush: true,
},
name: _.kebabCase(`${environment} ${projectName} Repository`),
},
);
const {password, userName} = await aws.ecr.getAuthorizationToken({
registryId: ecrRepo.registryId,
});
const dockerImage = new docker.Image(
_.kebabCase(`${projectName} Docker Image`),
{
imageName: _.kebabCase(`${projectName}`),
build: {
context: `./`,
dockerfile: "Dockerfile",
},
registry: {
server: ecrRepo.repositoryUrl,
password: password,
username: userName,
},
},
{
parent: ecrRepo,
},
);
purple-megabyte-83002
01/06/2022, 7:43 PMpulumi up
with a Stack stored on a S3 Backend on AccountA while having the default provider be Account B ?bored-table-20691
01/07/2022, 5:51 AMdefaultTags
doesn’t quite have this behavior, as it will not modify already existing resources unless there is something else that needs to update them, and it won’t really show that this is being done.proud-art-41399
01/07/2022, 11:18 AMecs_cluster_arn
output. Would it be possible to somehow apply the tags after creating the ECS cluster using Pulumi?fast-river-57630
01/07/2022, 7:16 PMawsx.ecs.Image.fromPath
. seems like it demands an ECR repo per stack? I cant pass awsx.ecs.Image.fromPath(name-of-existing-ecr-repo)
into it?purple-airline-31398
01/07/2022, 11:49 PMpulumi stack select dev
in a gitlab ci stage. error: failed to load checkpoint: blob (key ".pulumi/stacks/dev.json") (code=Unknown): MissingEndpoint: 'Endpoint' configuration is required for this service.
, How should I do?high-grass-3103
01/10/2022, 10:00 AMPreviewing update (prod):
Type Name Plan Info
pulumi:pulumi:Stack mystack
~ └─ aws:s3:Bucket mybucket update [diff: ~grants]
Outputs:
+ bucketAcl : [
+ [0]: {
+ permissions: [
+ [0]: "WRITE"
+ [1]: "READ"
]
+ type : "Group"
+ uri : "arn:aws:iam::432025153586:group/root"
}
]
+ bucketName: "mybucket"
Resources:
~ 1 to update
2 unchanged
Do you want to perform this update? yes
Updating (prod):
Type Name Status Info
pulumi:pulumi:Stack mystack
~ └─ aws:s3:Bucket mybucket updated [diff: ~grants]
Outputs:
+ bucketAcl : []
Can anyone offer a hint please?breezy-branch-28232
01/10/2022, 2:44 PMacoustic-window-73051
01/10/2022, 3:41 PMearly-airline-53287
01/10/2022, 7:22 PMhigh-grass-3103
01/10/2022, 7:40 PMfast-river-57630
01/10/2022, 8:26 PMlemon-salesclerk-6224
01/11/2022, 6:02 AMcallbackFunction
to use a specific cloudwatch log group? I am able to create the log group and set it as a dependency of the lambda, but another cloudwatch group gets created when I deploy and logs are instead sent to that new group instead of the one I specified as a dependency.lemon-salesclerk-6224
01/11/2022, 6:02 AMcallbackFunction
to use a specific cloudwatch log group? I am able to create the log group and set it as a dependency of the lambda, but another cloudwatch group gets created when I deploy and logs are instead sent to that new group instead of the one I specified as a dependency.callbackFunction
call. However, when the lambda is actually deployed, a default cloudwatch log group is being used instead. This one is not tracked in the stack and cannot be destroyed using pulumi.
Not sure if i'm maybe just missing some config somewhere, but this behavior seems odd.