rapid-byte-24256
12/14/2021, 12:02 PMerror: the current deployment has 1 resource(s) with pending operations:
* urn:pulumi:temp-production::test::kubernetes:apps/v1:Deployment::flagship, interrupted while updating
tried the recommend solution appeared in this error message by applying Pulumi stack export then import after removing pending operation but I get another issue
error: could not import deployment: [503] Service Unavailable
, Can anyone help me, please🙏?many-dress-54535
12/14/2021, 12:41 PMerror: autorest/azure: Service returned an error. Status=400 Code="RoleAssignmentUpdateNotPermitted" Message="Tenant ID, application ID, principal ID, and scope are not allowed to be updated."
when trying to create a azure_native.authorization.RoleAssignment
, I did a full destroy
and up
again but got the same results. Also, when I checked the role assignment isn't there,
any ideas?millions-journalist-34868
12/14/2021, 1:15 PMsquare-coat-62279
12/14/2021, 1:38 PMbillowy-laptop-45963
12/14/2021, 4:05 PMbrave-nightfall-19158
12/14/2021, 4:24 PMbrave-nightfall-19158
12/14/2021, 4:27 PMabundant-book-94104
12/14/2021, 10:51 PMlimited-army-96747
12/15/2021, 1:08 AMconst albPodRole = new aws.iam.Role('alb-service-account-role', {
assumeRolePolicy: `{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Federated": "${eksCluster.core.oidcProvider?.arn}"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"ForAnyValue:StringEquals": {
"${eksCluster.core.oidcProvider?.url}:sub": ["system:serviceaccount:kube-system:alb-controller-aws-load-balancer-controller"]
}
}
}
]
}
`,
}, {
dependsOn: eksCluster,
})
limited-army-96747
12/15/2021, 1:09 AMerror: aws:iam/role:Role resource 'alb-service-account-role' has a problem: "assume_role_policy" contains an invalid JSON: invalid character '\n' in string literal. Examine values at 'Role.AssumeRolePolicy'.
limited-army-96747
12/15/2021, 1:09 AMlimited-army-96747
12/15/2021, 1:10 AMhandsome-candle-10543
12/15/2021, 3:32 AMabundant-book-94104
12/15/2021, 4:05 AMsparse-spring-91820
12/15/2021, 10:31 AMerror: User 'arn:xxxxx:assumed-role/cluster-instanceRole-role-xxxxx' is not authorized to perform 'ses:SendRawEmail' on resource 'arn:aws:ses:us-east-1:xxxxx:identity/<mailto:no-reply@xxxxxx.com|no-reply@xxxxxx.com>'
.
But when I try it locally using the same AWS access and secret key and email it works.
Does anyone know how I can attach required ses policy to aws eks cluster?
My cluster code:
const cluster = new eks.Cluster('cluster', {
name: 'my-eks-cluster',
vpcId: vpc.id,
publicSubnetIds: vpc.publicSubnetIds,
privateSubnetIds: vpc.privateSubnetIds,
desiredCapacity: 2,
minSize: 1,
maxSize: 3
});
nutritious-shampoo-16116
12/15/2021, 3:25 PMmelodic-car-16900
12/15/2021, 3:45 PMproud-pizza-80589
12/15/2021, 3:46 PMsticky-airline-40485
12/15/2021, 3:46 PMmelodic-car-16900
12/15/2021, 3:47 PMmelodic-car-16900
12/15/2021, 3:49 PMproud-pizza-80589
12/15/2021, 3:49 PMproud-pizza-80589
12/15/2021, 3:50 PMproud-pizza-80589
12/15/2021, 3:50 PMproud-pizza-80589
12/15/2021, 3:51 PMfreezing-van-87649
12/15/2021, 3:52 PMproud-pizza-80589
12/15/2021, 3:52 PMgreen-daybreak-98726
12/15/2021, 3:59 PMproud-pizza-80589
12/15/2021, 4:03 PMpowerful-furniture-83753
12/15/2021, 5:23 PMpowerful-furniture-83753
12/15/2021, 5:23 PM