adamant-dress-73325
03/28/2019, 8:49 PMimport * as pulumi from "@pulumi/pulumi";
import { createMyService } from "./myservice";
let myService = createMyService();
export const allServices = {
myService
};
important-leather-28796
03/28/2019, 9:17 PMimportant-leather-28796
03/28/2019, 9:37 PM~/.kube/config
? I use gcloud to setup auth access key and it keeps disappearing. I could be doing this somewhere but wanted to rule out the clibusy-pizza-73563
03/28/2019, 10:20 PMproject-name/environment-name
?
I'm using the filesystem backend, it that's in any way relevant.millions-judge-24978
03/28/2019, 10:24 PMabundant-monitor-15855
03/29/2019, 12:44 PMstocky-island-3676
03/29/2019, 4:21 PM<http://github.com/pulumi/pulumi|github.com/pulumi/pulumi>
on branch v0.17.4
directly get’s the readerr = EOF
(in pkg/resource/plugin/plugin.go
).
/usr/local/bin/pulumi-language-nodejs 127.0.0.1:58785
returns a port number, as intended (just did brew reinstall pulumi
).brave-angle-33257
03/29/2019, 4:58 PMfierce-dinner-20116
03/29/2019, 6:48 PMbig-potato-91793
03/29/2019, 8:29 PMpulumi up
, I got the You must specify exactly two subnets because you've set zone count to two.
trying to deploy a AWS Elasticsearch servicebillowy-garage-68819
03/29/2019, 9:33 PMfierce-dinner-20116
03/30/2019, 1:59 AM#!/usr/bin/env bash
set -ex
cd "$(dirname "${BASH_SOURCE[0]}")/.."
if [ "$BUILDKITE_PULL_REQUEST" == "false" ]; then
export PULUMI_CI_BUILD_TYPE=push
else
export PULUMI_CI_BUILD_TYPE=pull_request
export PULUMI_CI=pr
fi
export PULUMI_CI_BUILD_ID=$BUILDKITE_BUILD_ID
export PULUMI_CI_BUILD_URL=$BUILDKITE_BUILD_URL
In the build step that actually runs pulumi preview --diff
, I can see that PULUMI_CI_BUILD_TYPE == pull_request
and PULUMI_CI == pr
. Is there anything else that I need to set?quiet-magazine-16687
03/30/2019, 8:55 AMquiet-magazine-16687
03/30/2019, 8:55 AMquiet-magazine-16687
03/30/2019, 8:55 AMquiet-magazine-16687
03/30/2019, 8:56 AMpulumi up
?quiet-magazine-16687
03/30/2019, 8:56 AMgreat-byte-67992
03/30/2019, 11:27 AMkubectl port-forward
- except i'm trying to do all of this within pulumi so that a dev can just do a pulumi up
and everything runs in their local minikube with automatic port forwarding. I don't suppose this is a supported use-case and i've just been hacking around trying to block pulumi up from exiting so that I can spawn the port-forward commands from nodejs. Has anyone else tried something like this? I guess i need a feature like a "post deployment callback" or a way to run before/after code and potenticall re-run pulumi (i.e. a watch mode). Should i just write a wrapper for pulumi?quiet-magazine-16687
03/31/2019, 2:02 AMClusterIP
transformation and then use the minikube tunnel
command so that you can reach your pods cluster ip from the host machinequiet-magazine-16687
03/31/2019, 2:02 AMboundless-author-24618
03/31/2019, 6:10 AMbig-potato-91793
04/01/2019, 12:07 AMbig-potato-91793
04/01/2019, 1:29 PMhelm
we can ovveride a variable value in the command line. It’s their a way to do this in pulumi. I got a stack by branch… i want the version of the main app to be the SHA version… in helm we are doing something like --set-string image.tag ${SHA}
.. what is the best way to do something like this in pulumi?cuddly-eye-68174
04/01/2019, 1:51 PMbillowy-garage-68819
04/01/2019, 3:57 PMbillowy-garage-68819
04/01/2019, 6:37 PMbillowy-laptop-45963
04/01/2019, 6:43 PMimportant-leather-28796
04/01/2019, 8:08 PMhtpasswd
to create a basic auth token prior to creating a secret with that token, the equivalent of
htpasswd -cb ${FILE} admin@${DOMAIN} ${TRAEFIK_PW}
kubectl create secret generic \
${NAME} \
--from-file=${FILE} \
--namespace=${TRAEFIK_NAMESPACE}
can I use a promise or other to make this happen?some-king-80791
04/02/2019, 12:13 AMbusy-umbrella-36067
04/02/2019, 2:35 AM.apply
on just the kms key id results in "Calling [toJSON] on an [Output<T>] is not supported.
const taskRolePolicy = new aws.iam.Policy('ecs-XXXXXX-task', {
name: 'ecs-XXXXXX-task',
policy: kmsKey.arn.apply(id => JSON.stringify({
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"kms:Decrypt"
],
"Resource": [
id
]
}
]
}))
})
busy-umbrella-36067
04/02/2019, 2:35 AM.apply
on just the kms key id results in "Calling [toJSON] on an [Output<T>] is not supported.
const taskRolePolicy = new aws.iam.Policy('ecs-XXXXXX-task', {
name: 'ecs-XXXXXX-task',
policy: kmsKey.arn.apply(id => JSON.stringify({
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"kms:Decrypt"
],
"Resource": [
id
]
}
]
}))
})
white-balloon-205
04/02/2019, 2:51 AMstocky-spoon-28903
04/02/2019, 2:57 AMbusy-umbrella-36067
04/02/2019, 12:12 PMconst taskRolePolicy = new aws.iam.Policy('ecs-XXXXXX-task', {
name: 'ecs-XXXXXX-task',
policy: JSON.stringify({
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"kms:Decrypt"
],
"Resource": [
kmsKey.id.apply(id => id)
]
}
]
})
})
or this
const taskRolePolicy = new aws.iam.Policy('ecs-XXXXXX-task', {
name: 'ecs-XXXXX-task',
policy: `{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"kms:Decrypt"
],
"Resource": [
${kmsKey.id.apply(id => id)}
]
}
]
}`
})
stocky-spoon-28903
04/02/2019, 12:14 PM