important-night-82492
07/17/2022, 10:54 AMapiVersion: <http://networking.k8s.io/v1|networking.k8s.io/v1>
kind: Ingress
metadata:
name: XXXX-web-ingress-rule-development
annotations:
<http://kubernetes.io/ingress.class|kubernetes.io/ingress.class>: nginx
<http://nginx.ingress.kubernetes.io/rewrite-target|nginx.ingress.kubernetes.io/rewrite-target>: /$1
<http://nginx.ingress.kubernetes.io/use-regex|nginx.ingress.kubernetes.io/use-regex>: "true"
<http://nginx.ingress.kubernetes.io/proxy-body-size|nginx.ingress.kubernetes.io/proxy-body-size>: "0"
<http://nginx.ingress.kubernetes.io/proxy-read-timeout|nginx.ingress.kubernetes.io/proxy-read-timeout>: "600"
<http://nginx.ingress.kubernetes.io/proxy-send-timeout|nginx.ingress.kubernetes.io/proxy-send-timeout>: "600"
<http://cert-manager.io/cluster-issuer|cert-manager.io/cluster-issuer>: letsencrypt-production
<http://nginx.ingress.kubernetes.io/ssl-redirect|nginx.ingress.kubernetes.io/ssl-redirect>: 'true'
<http://nginx.ingress.kubernetes.io/custom-http-errors|nginx.ingress.kubernetes.io/custom-http-errors>: "404"
<http://nginx.ingress.kubernetes.io/from-to-www-redirect|nginx.ingress.kubernetes.io/from-to-www-redirect>: "true"
<http://nginx.ingress.kubernetes.io/preserve-trailing-slash|nginx.ingress.kubernetes.io/preserve-trailing-slash>: "true"
<http://nginx.ingress.kubernetes.io/default-backend|nginx.ingress.kubernetes.io/default-backend>: ءءءء-web-service-development
<http://nginx.ingress.kubernetes.io/use-regex|nginx.ingress.kubernetes.io/use-regex>: "true"
<http://nginx.ingress.kubernetes.io/custom-http-errors|nginx.ingress.kubernetes.io/custom-http-errors>: "404"
spec:
tls:
- hosts:
- <http://oci.ءءءء.com|oci.xn--ggbaaa.com>
secretName: tls-secret-ءءءء-prodd
rules:
- host: <http://oci.ءءءء.com|oci.xn--ggbaaa.com>
http:
paths:
- path: /(.*)
pathType: Prefix
backend:
service:
name: ءءءء-web-service-development
port:
number: 3000
victorious-dusk-75271
07/17/2022, 12:23 PMvictorious-dusk-75271
07/18/2022, 1:52 AMvictorious-dusk-75271
07/18/2022, 1:53 AMripe-greece-78043
07/18/2022, 8:58 AMlet services = pulumi.k8s.services.get()
😪colossal-quill-8119
07/18/2022, 10:09 AMripe-greece-78043
07/18/2022, 11:22 AMnew k8s.kustomize.Directory.
It is strange behavior.victorious-dusk-75271
07/18/2022, 1:31 PMhttps://puu.sh/JbIfj/2d4325c964.png▾
billowy-mouse-89284
07/18/2022, 2:24 PMmillions-lunch-7967
07/18/2022, 2:45 PMvictorious-dusk-75271
07/18/2022, 2:59 PMerror: Running program '/workspace/infrastructure' failed with an unhandled exception:
ReferenceError: globalThis is not defined
at new Stack (/workspace/infrastructure/node_modules/@pulumi/runtime/stack.ts:66:9)
at Object.runInPulumiStack (/workspace/infrastructure/node_modules/@pulumi/runtime/stack.ts:45:23)
at Object.run (/workspace/infrastructure/node_modules/@pulumi/cmd/run/run.ts:373:20)
at v8Hooks.isInitializedAsync.then (/workspace/infrastructure/node_modules/@pulumi/cmd/run/index.ts:160:57)
at process._tickCallback (internal/process/next_tick.js:68:7)
at Function.Module.runMain (internal/modules/cjs/loader.js:834:11)
at startup (internal/bootstrap/node.js:283:19)
at bootstrapNodeJSCore (internal/bootstrap/node.js:623:3)
prehistoric-kite-30979
07/18/2022, 3:58 PMec:index:DeploymentTrafficFilterAssociation (hosted-tenant-cotiviti):
error: post-step event returned an error: failed to save snapshot: json: unsupported value: NaN
It appears as though something is causing the sanpshot to get corrupted which then means eveything else after this is failing to create.millions-lunch-7967
07/18/2022, 4:09 PMfancy-spoon-7206
07/18/2022, 5:18 PMtype subnet struct {
Id pulumi.StringOutput
Az string
}
publicSubnet := make([]subnet, 0, 1)
for index, az := range azs {
publicSubnet = append(publicSubnet, subnet{
Id: PublicSubnets.Index(<http://pulumi.Int|pulumi.Int>(index)),
Az: az,
})
}
I would like to export publicSubnet, but that is not valid.
The idea is to get an Outputs similar to
{
"publicSubnets": [
{
"id": "subnet-02d7930bd",
"az": "us-east-2a"
},
{
"id": "subnet-0a89e59bb",
"az": "us-east-2b"
},
{
"id": "subnet-04658194f",
"az": "us-east-2c"
}
],
"privateSubnets": [
{
"id": "subnet-00a9f3a9d6",
"az": "us-east-2a"
},
{
"id": "subnet-026eed9351,
"az": "us-east-2b"
},
{
"id": "subnet-0bfabcc5f666637c1",
"az": "us-east-2c"
}
]
}
fancy-spoon-7206
07/18/2022, 5:18 PMmodern-evening-83482
07/19/2022, 12:51 AMagreeable-window-77899
07/19/2022, 11:06 AMawsx.ecs.FargateService
which automatically creates ecr
repository for the container images. But while attempting to pulumi destroy
the stack I get this error
* ECR Repository (***-api-server-38-07d115e) not empty, consider using force_delete: RepositoryNotEmptyException: The repository with name '***-api-server-38-07d115e' in registry with id '***' cannot be deleted because it still contains images
Is there a way to force delete the ecr repo which is auto-created by awsx
?
Below is the way I'm creating the Fargate Service
const fargateService = new awsx.ecs.FargateService(`tooling-app-${stackName}`, {
name: `tooling-app-${stackName}`,
cluster: fargateCluster,
desiredCount: 1,
forceNewDeployment: true,
taskDefinitionArgs: {
containers: {
apolloServer: {
image: awsx.ecs.Image.fromDockerBuild(
`tooling-api-server-${stackName}`,
{
dockerfile: "../../api-server/Dockerfile",
context: "../../api-server/",
}
),
portMappings: [albTargetGroupApiServer],
},
}
}
ambitious-agent-35343
07/19/2022, 11:22 AMglamorous-afternoon-59004
07/19/2022, 2:15 PMglamorous-afternoon-59004
07/19/2022, 2:16 PMvictorious-dusk-75271
07/19/2022, 3:56 PMvictorious-dusk-75271
07/19/2022, 6:28 PMbreezy-greece-3236
07/19/2022, 9:48 PMbusy-island-31180
07/19/2022, 11:00 PMbusy-island-31180
07/19/2022, 11:00 PMbusy-island-31180
07/20/2022, 12:10 AMbrief-ram-15160
07/20/2022, 9:16 AMcloudfront
security headers policy in Pulumi?rich-agency-75207
07/20/2022, 9:16 AMrich-agency-75207
07/20/2022, 9:18 AMcluster
| masterAuth
| clusterCaCertificate
value becomes opaque / inaccessible (to pulumi itself).rich-agency-75207
07/20/2022, 9:18 AM