acoustic-telephone-56263
04/14/2023, 7:48 AMpulumi up -s <stack_name>
.
But the question is - what would be preferable way (or is it possible at all), not to tear down everything (schema, user data) when doing pulumi down
?fresh-spring-82225
04/14/2023, 4:00 PMI0414 08:41:28.471215 5148 log.go:69] computeDefaultProviderPlugins(): summary of default plugins:
I0414 08:41:28.471219 5148 log.go:75] command = 0.7.1
I0414 08:41:28.471221 5148 log.go:75] awsx = 1.0.2
I0414 08:41:28.471222 5148 log.go:75] docker = 4.1.2
I0414 08:41:28.471224 5148 log.go:75] aws = 5.35.0
I0414 08:41:36.755674 5148 log.go:75] Explicitly ignoring and discarding error: no git repository found from /Users/[...]
I0414 08:41:37.246940 5148 log.go:75] newUpdateSource(): failed to install missing plugins: could not get latest version for plugin pulumi: 404 HTTP error fetching plugin from <https://api.github.com/repos/pulumi/pulumi-pulumi/releases/latest>. If this is a private GitHub repository, try providing a token via the GITHUB_TOKEN environment variable. See: <https://github.com/settings/tokens>
I0414 08:41:50.086882 5148 log.go:75] eventSink::Info(<{%reset%}>Pushing Image to the registry<{%reset%}>)
I0414 08:41:50.195317 5148 log.go:75] eventSink::Info(<{%reset%}>The push refers to repository [....<http://dkr.ecr.us-east-2.amazonaws.com/...|dkr.ecr.us-east-2.amazonaws.com/...>]<{%reset%}>)
I0414 08:41:50.912196 5148 log.go:75] provider received rpc error `Unknown`: `denied: Your authorization token has expired. Reauthenticate and try again.`
I0414 08:41:50.912203 5148 log.go:75] rpc error kind `Unknown` may not be recoverable
I0414 08:41:50.912265 5148 log.go:75] eventSink::Error(<{%reset%}>denied: Your authorization token has expired. Reauthenticate and try again.<{%reset%}>)
I0414 08:41:51.056814 5148 log.go:75] StepExecutor worker(19): step update on urn:pulumi:dev::[...]::docker:index/image:Image::[...] failed with an error: denied: Your authorization token has expired. Reauthenticate and try again.
green-spoon-10034
04/15/2023, 8:07 PMgreen-oxygen-82594
04/17/2023, 7:47 AMlively-air-24325
04/17/2023, 9:46 AMabundant-easter-70390
04/17/2023, 10:30 AMpulumi import
on AWS Lambdas? (when I use the AWS client, I see that there is a path to the current version definied, so there is already code...)dry-journalist-60579
04/17/2023, 12:57 PMfresh-spring-82225
04/17/2023, 7:38 PMdry-journalist-60579
04/18/2023, 3:40 AMfew-analyst-47494
04/18/2023, 9:07 AMsecurityGroupIds
is a required field in the `vpcConfig` for AWS Lambdas.
In my architecture, I have a lambda defined in the private subnet of a VPC and already attached a security group to the VPC. So when I’m associating the lambda with the subnet using subnetIds
in vpcConfig
, why do I necessarily have to respecify the securityGroupId too?helpful-pillow-14958
04/20/2023, 7:37 PMpulumi login s3://<bucket-name>
is going to create the self-managed backend automatically as bootstrap/initialization.
Is this a wrong expectation or something I am missing here https://www.pulumi.com/docs/intro/concepts/state/#aws-s3 ?curved-kitchen-24115
04/20/2023, 9:47 PMAWS_PROFILE=admin pulumi up -s <org>/<stack>
(locally) to an environment where the instances we run on have the permissions the admin profile had as part of their instance profile.
Now when we run pulumi up -s <org>/<stack>
we get the following printed to our terminal: The config profile (admin) could not be found
. At no point have we done pulumi config set aws:profile admin -s <org>/<stack>
- so I’m pretty confused as to why this is showing up in the terminal.
The message itself is definitely from the AWS SDK (this is well documented on the web). What’s not clear to me what part of pulumi is informing the SDK that the profile admin
(specifically) is the correct profile. I’ve run pulumi config get -s <org>/<stack>
for all of our stacks that use the AWS provider and I can confirm aws:profile
is not present in any of them.
Is anyone able to point me in the right direction to either silence this message, or determine whether it is a problem?salmon-motherboard-78006
04/20/2023, 11:37 PMcrooked-laptop-67565
04/22/2023, 12:28 AMcrooked-laptop-67565
04/22/2023, 12:34 AMaws.autoscaling.Tag
...handsome-twilight-36302
04/22/2023, 7:04 PMpublicSubnetIds
property of awsx.ec2.DefaultVpc, but I realized that's returning all my subnet ids, both public and private. Is there a reason for that and a way to get around that?gifted-barista-41153
04/23/2023, 1:01 AM@pulumi/aws
to a version >= 5.35.0 (changelog) on an existing stack because I get the following error: panic: interface conversion: interface {} is nil, not map[string]interface {}
(full error message in thread 🧵)
Does anyone know what I can do to remedy this?calm-account-35699
04/24/2023, 3:39 AMsparse-branch-46500
04/25/2023, 11:19 AMfromExistingIds
method is no longer available in the latest version of the awsx
library. Additionally, the aws.ec2.getVpc()
method returns a different type than what is accepted as an argument when creating an awsx.ecs.Cluster
resource.crooked-lunch-29479
04/25/2023, 6:21 PMdry-journalist-60579
04/25/2023, 8:50 PMdefault_cache_behavior
for a CloudFront Distribution to use one of the AWS managed cache policies?icy-controller-6092
04/26/2023, 5:13 AMcreamy-beach-53040
04/26/2023, 1:38 PMcluster = peks.Cluster(
f"cluster-{project_name}-{stack_name}",
vpc_id=vpc.vpc_id,
subnet_ids=kube_subnets,
node_associate_public_ip_address=False,
enabled_cluster_log_types=[
"api",
"audit",
"authenticator",
],
tags=tags,
node_group_options=peks.ClusterNodeGroupOptionsArgs(
extra_node_security_groups=[db_security_group.id],
min_size=config.get("min_size"),
max_size=config.get("max_size"),
desired_capacity=config.get("desired_capacity"),
instance_type=config.get("instance_type")
),
instance_role=cluster_node_role,
provider_credential_opts=peks.KubeconfigOptionsArgs(profile_name="pulumi")
)
I also tried setting the security group as a parameter of the pulumi_eks.NodeGroupV2 constructor, but it didn't work either. In that case, I got an error message saying the security group didn't exist.
Any ideas on what to try next?incalculable-midnight-8291
04/27/2023, 8:14 AMpulumi/awsx
from 0.40.0
to 1.0.2
and now preview that it wants to tear down all resources and recreate them 😱
Inspecting the diff I see the urn in the newer package is awsx:ec2:Vpc
and for the old one: awsx:x:ec2.Vpc
. Is there some way to lock the urn or avoid the replacement?
I tried adding retainOnDelete and import .. but I can seem to get it to workminiature-church-77328
04/27/2023, 9:35 AMmysterious-family-43099
04/27/2023, 5:13 PMinterface CreateEc2InstanceArgs {
name: string;
stackName: string;
instanceType: string;
vpcId: pulumi.Output<string>;
isPublic: boolean;
enableHttp: boolean;
sshPublicKey: string;
rootBlockDevice: aws.types.input.ec2.InstanceRootBlockDevice;
amiName?: string;
userData?: string;
useEip?: boolean;
}
const instance = new aws.ec2.Instance(instanceName, {
instanceType,
// For now we are assuming that if the EC2 instance is public then we want a public IP.
// This may not necessarily be true if we put it behind a load balancer.
subnetId,
iamInstanceProfile,
keyName: keyPair.keyName,
associatePublicIpAddress: isPublic,
rootBlockDevice: {
...rootBlockDevice,
tags: { Name: volumeName, Stack: stackName },
},
vpcSecurityGroupIds: [securityGroup.id],
...(userData && { userData }),
ami: ami.id,
tags: { Name: instanceName, Stack: stackName },
});
mysterious-family-43099
04/27/2023, 5:15 PMdeleteOnTerminate
to false
but that didn't seem to do anythingmysterious-family-43099
04/28/2023, 3:40 PMcacheFrom
option is the solve: https://www.pulumi.com/blog/build-images-50x-faster-docker-v4/
What I don't fully understand is the behavior. If I just set cacheFrom
to true
is this sufficient if all my images are tagged with latest
? Will this only pull the cached image if nothing has changed? Or will this know to pull the last image and start from the latest layer that invalidates the cache?mysterious-family-43099
05/01/2023, 6:40 PMconst image = new docker.Image(`${stackName}-image`, {
build: {
cacheFrom: {
images: [pulumi.interpolate`${repo.repositoryUrl}:latest`],
},
context: `../../../${project}`,
...(dockerfileName && {
dockerfile: `../../../${project}/${dockerfileName}`,
}),
args: dockerArgs,
platform: "linux/amd64",
},
imageName: pulumi.interpolate`${repo.repositoryUrl}:latest`,
registry: {
password: pulumi.secret(authToken.password),
server: repo.repositoryUrl,
username: authToken.userName,
},
});
return image.repoDigest as pulumi.Output<string>;
mysterious-family-43099
05/01/2023, 6:40 PM