plain-tiger-79744
03/30/2020, 1:16 PMancient-megabyte-79588
03/30/2020, 6:25 PM.configMap
that can replace the coredns-custom
configMap that is already in place in a new AKS cluster. I have this:
let corednsConfigMap = new k8s.core.v1.ConfigMap("coredns-custom",
{
metadata:{name: "coredns-custom", namespace:"kube-system"},
data: {
"test.server" : " | \
<domain to rewrite>:53 { \
errors \
cache 30 \
rewrite name substring <domain to rewrite> default.svc.cluster.local \
forward . /etc/resolv.conf # you can redirect this to a specific DNS server such as 10.0.0.10 \
}"
}
}, {provider: k8sProvider});
ancient-megabyte-79588
03/30/2020, 6:26 PMconfigMap
, but because it is already in the cluster, it fails. When I pulumi refresh
it doesn't see that this configMap
is in the cluster, so it isn't able to sort itself out to change to an update
ancient-megabyte-79588
03/30/2020, 6:41 PMconfigMap
in the cluster because it is in a Deployment and gets recreated quickly. I'd rather not do the update via kubectl
and am hoping that Pulumi has something I don't know about that would allow this.colossal-room-15708
03/31/2020, 6:12 AMcolossal-room-15708
03/31/2020, 6:48 AM~ └─ azure:network:VirtualNetwork ssvc-vnet **updating failed** [diff: ~tags]; 1 error
Diagnostics:
azure:network:VirtualNetwork (ssvc-vnet):
error: 1 error occurred:
* updating urn:pulumi:prod::azure-foundations::azure:network/virtualNetwork:VirtualNetwork::ssvc-vnet: Error Creating/Updating Virtual Network "ssvc-vnet-prod" (Resource Group "sharedservices-prod"): network.VirtualNetworksClient#CreateOrUpdate: Failure sending request: StatusCode=400 -- Original Error: Code="InUseSubnetCannotBeDeleted" Message="Subnet GatewaySubnet is in use by /subscriptions/<subId>/resourceGroups/sharedservices-prod/providers/Microsoft.Network/virtualNetworkGateways/vpn-gw/ipConfigurations/vpn-gw-ipconf and cannot be deleted. In order to delete the subnet, delete all the resources within the subnet. See <http://aka.ms/deletesubnet|aka.ms/deletesubnet>." Details=[]
Anybody gotten that before?colossal-room-15708
03/31/2020, 6:49 AMmammoth-train-70005
03/31/2020, 12:53 PMaz-cli
This is kind of weird, because pulumi other wise works great with that Identity, I have to set the AZURE_STORAGE_KEY to make it work, which is not the Ideal Solution. Any Hints or Ideas?better-rainbow-14549
03/31/2020, 1:17 PMbetter-rainbow-14549
03/31/2020, 1:18 PMbetter-rainbow-14549
03/31/2020, 1:18 PMastonishing-afternoon-15745
04/01/2020, 1:04 PMplain-tiger-79744
04/01/2020, 4:42 PMenough-kite-69616
04/01/2020, 5:33 PMDiagnostics:
azure:core:ResourceGroup (RD-FoundationalServices-rg):
error: Error ensuring Resource Providers are registered.
Terraform automatically attempts to register the Resource Providers it supports to
ensure it's able to provision resources.
If you don't have permission to register Resource Providers you may wish to use the
"skip_provider_registration" flag in the Provider block to disable this functionality.
Please note that if you opt out of Resource Provider Registration and Terraform tries
to provision a resource from a Resource Provider which is unregistered, then the errors
may appear misleading - for example:
> API version 2019-XX-XX was not found for Microsoft.Foo
Could indicate either that the Resource Provider "Microsoft.Foo" requires registration,
but this could also indicate that this Azure Region doesn't support this API version.
More information on the "skip_provider_registration" flag can be found here:
<https://www.terraform.io/docs/providers/azurerm/index.html#skip_provider_registration>
Original Error: Cannot register provider Microsoft.DocumentDB with Azure Resource Manager: resources.ProvidersClient#Register: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code="AuthorizationFailed" Message="The client <mailto:'jcarreira@mtb.com|'jcarreira@mtb.com>' with object id 'a25caa95-0e42-47b3-99a0-47bc2ba17ceb' does not have authorization to perform action 'Microsoft.DocumentDB/register/action' over scope '/subscriptions/7e01b735-d940-4f45-953c-08f86d80d43f' or the scope is invalid. If access was recently granted, please refresh your credentials.".
enough-kite-69616
04/01/2020, 5:33 PMenough-kite-69616
04/01/2020, 6:18 PMerror: A resource with the ID "/subscriptions/7e01b735-d940-4f45-953c-08f86d80d43f/resourceGroups/RD-FoundationalServices-rg" already exists - to be managed via Terraform this resource needs to be imported into the State. Please see the resource documentation for "azurerm_resource_group" for more information.
ancient-megabyte-79588
04/01/2020, 6:26 PMexport const resourceGroupName = "<your_resource_group_name>";
// get the Azure Resource Group
const resourceGroup = azure.core.ResourceGroup.get(resourceGroupName, `/subscriptions/<subscriptionId>/resourceGroups/${resourceGroupName}`);
@enough-kite-69616 ^^^ancient-megabyte-79588
04/01/2020, 6:31 PMpublicIpAddress
from an azure resource when provisioning an Nginx Ingress Controller? I can't seem to get the nginx-ingress-controller to accept the one I provide in pulumi with this code.
// Deploy ingress-controller using helm to AKS Cluster
const nginxIngress = new k8s.helm.v3.Chart("nginx2", {
chart: "nginx-ingress-controller",
repo: "bitnami",
values: {
"controller.service.loadBalancerIP": infra.getOutput("publicIpAddress"),
serviceType: "LoadBalancer",
nodeCount: 2,
}
}, {provider: k8sProvider});
ancient-megabyte-79588
04/01/2020, 6:32 PM// Deploy ingress-controller using helm to AKS Cluster
const nginxIngress = new k8s.helm.v3.Chart("nginx2", {
chart: "nginx-ingress-controller",
repo: "bitnami",
values: {
controller:{ service: { loadBalancerIP": infra.getOutput("publicIpAddress")}},
serviceType: "LoadBalancer",
nodeCount: 2,
}
}, {provider: k8sProvider});
ancient-megabyte-79588
04/01/2020, 6:33 PMancient-megabyte-79588
04/01/2020, 6:59 PMenough-kite-69616
04/01/2020, 8:02 PMUpdating (dev):
Type Name Status Info
pulumi:pulumi:Stack dapr-poc-dev **failed** 1 error; 2 warnings
+ ├─ azuread:index:Application aks **creating failed** 1 error
+ └─ azure:operationalinsights:AnalyticsWorkspace aksloganalytics created
Diagnostics:
pulumi:pulumi:Stack (dapr-poc-dev):
warning: resource plugin azure is expected to have version >=2.3.1, but has ; the wrong version may be on your path, or this may be a bug in the plugin
warning: resource plugin azuread is expected to have version >=1.8.0, but has ; the wrong version may be on your path, or this may be a bug in the plugin
error: update failed
azuread:index:Application (aks):
error: graphrbac.ApplicationsClient#Create: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code="Unknown" Message="Unknown service error" Details=[{"odata.error":{"code":"Authorization_RequestDenied","date":"2020-04-01T19:53:21","message":{"lang":"en","value":"Insufficient privileges to complete the operation."},"requestId":"d1c7500a-eb0c-4bd7-b182-86b214c1eb15"}}]
enough-kite-69616
04/01/2020, 8:12 PMastonishing-afternoon-15745
04/01/2020, 8:26 PMenough-kite-69616
04/01/2020, 8:27 PMastonishing-afternoon-15745
04/01/2020, 8:27 PMenough-kite-69616
04/01/2020, 8:27 PMastonishing-afternoon-15745
04/01/2020, 8:28 PMenough-kite-69616
04/01/2020, 8:28 PMastonishing-afternoon-15745
04/01/2020, 8:29 PMAzure Active Directory Graph
api and it currently is not allowed to do so.astonishing-afternoon-15745
04/01/2020, 8:29 PMAzure Active Directory Graph
api and it currently is not allowed to do so.