boundless-monkey-50243
01/28/2020, 4:11 PMsparse-intern-71089
01/28/2020, 4:29 PMmany-lock-25065
01/28/2020, 7:23 PM<type>-<name>
?)stocky-student-96739
01/28/2020, 7:41 PMmany-lock-25065
01/28/2020, 7:55 PMgentle-bird-84737
01/28/2020, 8:20 PMfresh-daybreak-17893
01/28/2020, 10:29 PMpulumi preview
working on their workstations. This isn't currently the case since some team members have already upgraded to 1.9.1, which is the version exhibiting the unwanted behavior, while some others are on 1.8.1 which still works for our use case.fresh-daybreak-17893
01/28/2020, 10:29 PMrm
the ~/.pulumi
directory, download the 1.8.1 tarball from https://www.pulumi.com/docs/get-started/install/versions/ then extract the tarball and put extracted binaries somewhere on $PATH. Is there anything else we should watch out for?colossal-ram-89482
01/29/2020, 12:31 AMsilly-dusk-21491
01/29/2020, 11:24 AMambitious-crayon-56788
01/29/2020, 4:41 PMZipBlob
resource, but without the blob that was previously created being deleted after every run of pulumi up
.
Each blob is uniquely named.
I have discovered CustomResourceOptions
, and from those options I've used deleteBeforeReplace: false
, assuming this would stop to resource being deleted before it was replaced. However, this is not the case, and the blob previously created by the Pulumi resource is still deleted.
How can I keep blobs previously created by the Pulumi resource?
const zipBlob = new azure.storage.ZipBlob("storageBlob", {
name: `MyApp.${version}.zip`,
storageAccountName: storageAccount.name,
storageContainerName: storageContainerForReleases.name,
type: "block",
content: new pulumi.asset.FileArchive("MyFileArchive"),
}, {
deleteBeforeReplace: false
});
I have also tried to use the CustomResourceOptions
of protect
, but this caused the pulumi up
operation to fail because Pulumi still tries to delete the resource, but can't because of the protection.thankful-optician-22583
01/29/2020, 5:04 PMcuddly-australia-15715
01/29/2020, 8:20 PMcuddly-australia-15715
01/29/2020, 8:23 PMadventurous-park-10099
01/29/2020, 8:37 PMcold-motorcycle-78950
01/30/2020, 12:40 PMcalm-parrot-97479
01/30/2020, 12:49 PMbitter-dentist-28132
01/30/2020, 3:18 PMincalculable-quill-13895
01/30/2020, 6:30 PMgray-city-50684
01/30/2020, 7:08 PMcuddly-australia-15715
01/30/2020, 7:35 PMcold-author-10079
01/31/2020, 9:36 AMred-football-97286
01/31/2020, 11:55 AMenvironments = {
'HealthChecks': [health_check_1.id, health_check_2.id],
'Names': ['Primary', 'Secondary']
}
# Metric alarm for both primary and secondary sites
for index in range(0, (len(environments))):
cloudwatch.MetricAlarm(
f"{environments['Names'][index]}_site_alarm",
__opts__=ResourceOptions(
depends_on=[sns_topic, sns_email]),
alarm_actions=[sns_topic.arn],
alarm_description=f"{environments['Names'][index]} alarm for website",
name=f"{environments['Names'][index]}_site",
comparison_operator="LessThanThreshold",
statistic="Minimum", evaluation_periods=3,
metric_name="HealthCheckStatus",
namespace="AWS/Route53",
period=60, threshold=1,
dimensions={
'HealthCheckId': environments['HealthChecks'][index]
}
)
broad-helmet-79436
01/31/2020, 1:42 PMcolossal-room-15708
01/31/2020, 6:13 PMable-crayon-21563
01/31/2020, 6:29 PMcareful-market-30508
01/31/2020, 7:55 PMbored-river-53178
02/02/2020, 6:33 PMbored-river-53178
02/02/2020, 10:11 PMmany-garden-84306
02/02/2020, 10:21 PM