bitter-island-28909
01/23/2019, 2:12 PMbrainy-magician-83981
01/23/2019, 3:28 PMadamant-restaurant-73893
01/23/2019, 5:13 PMfull-dress-10026
01/23/2019, 5:43 PMbusy-umbrella-36067
01/23/2019, 5:48 PMpulumi refresh
from running. Is there an issue filed for that?sparse-tiger-67367
01/23/2019, 6:06 PMerror: aws:ec2/securityGroup:SecurityGroup resource 'sg1' has a problem: ingress.0: invalid or unknown key: source_security_group_id
Can anybody help me figure this one out?adamant-restaurant-73893
01/23/2019, 6:40 PMchilly-dusk-63796
01/23/2019, 7:04 PMchilly-dusk-63796
01/23/2019, 7:25 PMchilly-dusk-63796
01/23/2019, 7:26 PMbrainy-magician-83981
01/23/2019, 8:15 PMwarning: A new version of Pulumi is available. To upgrade from version '0.0.0' to '0.16.11', visit <https://pulumi.io/install> for manu
al instructions and release notes.
brainy-magician-83981
01/23/2019, 8:25 PMbrainy-magician-83981
01/23/2019, 8:39 PMred-lamp-97876
01/23/2019, 9:24 PMbusy-umbrella-36067
01/23/2019, 9:36 PM~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updating error: No matching service found for ingress rule: ""
~ kubernetes:extensions:Ingress internal-rpc updated error: No matching service found for ingress rule: ""
@ Updating...| / - \ | / prebuilt:Deploy ethereum
miniature-potato-84713
01/23/2019, 11:04 PMchilly-photographer-60932
01/24/2019, 12:09 AMPlan apply failed: deleting urn:pulumi:docs::arcusdocs::aws:cloudfront/distribution:Distribution::cdn: error updating CloudFront Distribution (E1QDDY8Y64KZAE): PreconditionFailed: The request failed because it didn't meet the preconditions in one or more request-header fields.
while trying destroy aws:cloudfront:Distribution (cdn)
chilly-photographer-60932
01/24/2019, 12:09 AMbrainy-magician-83981
01/24/2019, 12:25 AMresourceId
, how do you obtain it? For example: let ddb_tbl = new aws.dynamodb.Table("mytable", ...);
let scalable_target = new aws.appautoscaling.Target('my_scalable_target', {
resourceId: 'table/' + ddbl_table.name
});
The resourceId setting above does not work.brainy-magician-83981
01/24/2019, 12:37 AMresourceId: ddb_tbl.name.apply( id => `table/${id}`)
brainy-magician-83981
01/24/2019, 12:44 AMchilly-photographer-60932
01/24/2019, 1:03 AMerror: the current deployment has 1 resource(s) with pending operations:
* urn:pulumi:docs::xyz::aws:cloudfront/distribution:Distribution::cdn, interrupted while deleting`?
millions-judge-24978
01/24/2019, 2:48 AMrequire("@pulumi/docker").Image
docker images and Github Actions workflows? Using this resource fails due to github disallowing docker image inspect
for some reason. Someone else has created an issue here https://github.com/pulumi/pulumi-cloud/issues/681.
This error makes the otherwise awesome example https://github.com/pulumi/actions-example-gke-rails sort of sad since it doesn't work. Was this not an issue at the time of writing?shy-finland-77998
01/24/2019, 11:59 AMadamant-restaurant-73893
01/24/2019, 4:37 PM@pulumi/eks
component and getting provisioned quickly and effectively https://blog.pulumi.com/the-fastest-path-to-deploying-kubernetes-on-aws-with-eks-and-pulumifull-dress-10026
01/24/2019, 7:15 PMconst nginx2 = new k8s.helm.v2.Chart("nginx-reverse-proxy", {
chart: "bitnami/nginx",
repo: "stable",
version: "2.1.2",
values: {
vhost: nginxConfStr
}
}, {providers: {kubernetes: cluster.provider}});
and I receive this error message. I have no idea what this means 😕
/home/kenny/compute_software/infrastructure/pulumi-k8s-src/node_modules/got/source/create.js:61
got.stream = (url, options) => got(url, {...options, stream: true});
^^^
SyntaxError: Unexpected token ...
at Object.exports.runInThisContext (vm.js:53:16)
at Module._compile (module.js:513:28)
at Object.Module._extensions..js (module.js:550:10)
at Module.load (module.js:458:32)
at tryModuleLoad (module.js:417:12)
at Function.Module._load (module.js:409:3)
at Module.require (module.js:468:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/kenny/compute_software/infrastructure/pulumi-k8s-src/node_modules/got/source/index.js:3:16)
at Module._compile (module.js:541:32)
early-musician-41645
01/24/2019, 8:07 PMred-lamp-97876
01/24/2019, 8:19 PMnamespace:value
or can they support multiple levels such as namespace:section:value
?white-ghost-79509
01/24/2019, 8:30 PMbitter-island-28909
01/24/2019, 9:00 PMcloud:*
providers this afternoon, and while I really like how they automatically generate all the required resources, is there a way to override an aspect of one in a cloud-specific way without dropping back to defining everything manually?
Case in point: I like everything Pulumi generates in AWS for a cloud:Task
but I really need to give it a custom execution role (or attach a custom policy to the role it generates.) Is there a clean way to benefit from the auto-generated components while selectively making a few tweaks?bitter-island-28909
01/24/2019, 9:00 PMcloud:*
providers this afternoon, and while I really like how they automatically generate all the required resources, is there a way to override an aspect of one in a cloud-specific way without dropping back to defining everything manually?
Case in point: I like everything Pulumi generates in AWS for a cloud:Task
but I really need to give it a custom execution role (or attach a custom policy to the role it generates.) Is there a clean way to benefit from the auto-generated components while selectively making a few tweaks?