early-musician-41645
07/24/2019, 7:12 PMchilly-photographer-60932
07/24/2019, 7:47 PMOutput<string>
with string
?
Here is the example
const clusterName = xyz
.getOutput('cluster')
.apply(cluster => cluster.ClusterName) as Output<string>;
The code has to compare the clusterName
.
I have tried with something like this and it failed.
switch (clusterName) {
case Output.create('alpha'):{
early-musician-41645
07/24/2019, 8:31 PMaws.secretsmanager.getSecret({name: "foo"});
with a try-catch?important-leather-28796
07/24/2019, 8:39 PMprovider
- making this a bad situation. We pulumi refresh
on osx yesterday, my understanding is that would affect osx identical to our linux ci node. Who can help with this production issue?plain-businessperson-30883
07/24/2019, 9:49 PMstable/grafana
chart but it is installing the tests too. I’d like to exclude them, but I can’t find a way to do it. Any suggestions?swift-painter-31084
07/24/2019, 11:55 PMInvoke of 'aws:sqs/getQueue:getQueue' failed: undefined (undefined)
const queue = new aws.sqs.Queue( `${ config.namespace }_${ resourceName }` );
// get the queue's url
const queueUrl = pulumi.output( aws.sqs.getQueue( {
name: queue.name,
} ) ).apply( v => v.url );
// get the queue's arn
const queueArn = pulumi.output( aws.sqs.getQueue( {
name: queue.name,
} ) ).apply( v => v.arn );
module.exports = () => queue;
module.exports.arn = queueArn;
module.exports.url = queueUrl;
full-dress-10026
07/25/2019, 12:00 AMnew k8s.core.v1.Secret("foo-test", {
metadata: {
name: "foo-test"
},
data: {
key: "asd123"
},
type: "Opaque"
}, {provider: k8sProvider});
and have been getting
error: Plan apply failed: Secret in version "v1" cannot be handled as a Secret: v1.Secret.ObjectMeta: v1.ObjectMeta.TypeMeta: Kind: Data: decode base64: illegal base64 data at input byte 4, error found in #10 byte of ...|":"asd123"},"kind":"|..., bigger context ...|{"apiVersion":"v1","data":{"key":"asd123"},"kind":"Secret","metadata":{"labels":{"app.kuber|...
I can create the secret from the CLI just fine.full-dress-10026
07/25/2019, 12:44 AM|-
) in a transformation (https://github.com/pulumi/pulumi-kubernetes/blob/4e61e0d307317a57c249ba599d206e5703f89be1/tests/integration/yaml-url/step1/index.ts#L22-L37), is there a way to easily do that?full-dress-10026
07/25/2019, 12:53 AMdamp-notebook-63293
07/25/2019, 1:56 AMtransformation
receives given yaml string already parsed to JS object. given your yaml string, it should look like this:
{
"apiVersion": "v1",
"kind": "ConfigMap",
"metadata": {
"name": "honeycomb-agent-config",
"namespace": "default"
},
"data": {
"config.yaml": "# By default, submit logs from interesting system pods such as the\n# kube DNS\nwatchers:\n - dataset: kubernetes-logs\n labelSelector: \"k8s-app=aws-node\"\n namespace: kube-system\n parser: glog\n - dataset: kubernetes-logs\n labelSelector: \"k8s-app=kube-proxy\"\n namespace: kube-system\n parser: glog\n - dataset: kubernetes-logs\n labelSelector: \"k8s-app=kube-dns\"\n namespace: kube-system\n parser: glog\nverbosity: info\n# splitLogging directs trace, debug, info, and warn log levels to stdout\n# rather than stderr.\nsplitLogging: false"
}
}
therefore, you need to JSON.parse(manifest.data["config.yaml"])
, modify the object as you need, and JSON.stringify()
it back to manifest.data["config.yaml"]
billions-lock-80282
07/25/2019, 9:45 AMgray-lawyer-89054
07/25/2019, 10:30 AMdocker-compose -f docker-compose.yml -f docker-compose.prod.yml up
busy-pizza-73563
07/25/2019, 12:36 PMglamorous-waitress-51149
07/25/2019, 2:42 PMglamorous-waitress-51149
07/25/2019, 2:42 PMglamorous-waitress-51149
07/25/2019, 2:42 PM2019-07-25T10:23:20.7618225Z Diagnostics:
2019-07-25T10:23:20.7618650Z pulumi:pulumi:Stack (profiles-sandbox):
2019-07-25T10:23:20.7620280Z error: update failed
2019-07-25T10:23:20.7620503Z
2019-07-25T10:23:20.7620651Z aws:rds:Cluster (default):
2019-07-25T10:23:20.7620797Z error: Plan apply failed: 1 error occurred:
2019-07-25T10:23:20.7621447Z * updating urn:pulumi:sandbox::profiles::aws:rds/cluster:Cluster::default: Failed to modify RDS Cluster (profiles-mysql-aurora): InvalidParameterCombination: You currently can't modify EngineVersion with Aurora Serverless.
2019-07-25T10:23:20.7621983Z status code: 400, request id: cdfb50b7-cb26-49a5-becc-48fb472e1a22
2019-07-25T10:23:20.7622213Z
2019-07-25T10:23:20.7622765Z Resources:
2019-07-25T10:23:20.7622890Z + 69 created
2019-07-25T10:23:20.7623010Z ~ 5 updated
2019-07-25T10:23:20.7623155Z 2 changes. 49 unchanged
2019-07-25T10:23:20.7623266Z
2019-07-25T10:23:20.7623390Z Duration: 3m26s
full-dress-10026
07/25/2019, 3:59 PMdamp-book-35965
07/25/2019, 5:09 PMfuture-morning-96441
07/25/2019, 5:37 PMcool-egg-852
07/25/2019, 6:50 PMincalculable-diamond-5088
07/25/2019, 8:03 PMpulumi up
began showing this diff:
~ kubernetes:policy/v1beta1:PodSecurityPolicy: (update)
[id=prmetheus-operator-kube-state-metrics]
[urn=urn:pulumi:staging-account::staging-account::...:account$...:eksCluster$aws:eks/cluster:Cluster$...:eksBasics$...:prometheus$kubernetes:<http://helm.sh/v2:Chart$kubernetes:policy/v1beta1:PodSecurityPolicy::monitoring/prmetheus-operator-kube-state-metrics]|helm.sh/v2:Chart$kubernetes:policy/v1beta1:PodSecurityPolicy::monitoring/prmetheus-operator-kube-state-metrics]>
[provider=urn:pulumi:staging-account::staging-account::...:account$...:eksCluster$pulumi:providers:kubernetes::k8s::989bfcae-4c24-4ad3-aba9-d1620215508b]
~ spec: {
+ hostIPC : false
+ hostNetwork : false
+ hostPID : false
+ privileged : false
+ readOnlyRootFilesystem: false
}
~ kubernetes:policy/v1beta1:PodSecurityPolicy: (update)
[id=prmetheus-operator-prometh-alertmanager]
[urn=urn:pulumi:staging-account::staging-account::...:account$...a:eksCluster$aws:eks/cluster:Cluster$...:eksBasics$...:prometheus$kubernetes:<http://helm.sh/v2:Chart$kubernetes:policy/v1beta1:PodSecurityPolicy::monitoring/prmetheus-operator-prometh-alertmanager]|helm.sh/v2:Chart$kubernetes:policy/v1beta1:PodSecurityPolicy::monitoring/prmetheus-operator-prometh-alertmanager]>
[provider=urn:pulumi:staging-account::staging-account::...:account$...:eksCluster$pulumi:providers:kubernetes::k8s::989bfcae-4c24-4ad3-aba9-d1620215508b]
~ spec: {
+ hostIPC : false
+ hostNetwork : false
+ hostPID : false
+ privileged : false
+ readOnlyRootFilesystem: false
}
Any idea how to get rid of those diffs (and the redundant updates it triggers)?high-translator-22614
07/25/2019, 8:07 PMComponentResource
?swift-painter-31084
07/25/2019, 10:55 PMearly-intern-90238
07/26/2019, 12:27 AMearly-intern-90238
07/26/2019, 12:28 AMearly-intern-90238
07/26/2019, 12:28 AMearly-intern-90238
07/26/2019, 12:28 AMearly-intern-90238
07/26/2019, 12:29 AMearly-intern-90238
07/26/2019, 12:29 AMearly-intern-90238
07/26/2019, 12:36 AMearly-intern-90238
07/26/2019, 12:36 AM