ripe-shampoo-80285
01/14/2022, 11:35 PMboundless-telephone-98269
01/16/2022, 10:53 PMcertificates.NewCertificateSigningRequest(
? DependsOn
doesn't wait for the CSR to be approved or denied. I can think of two patterns to use:
1. Poll the status of the CSR until it has been manually approved or denied. Then return the certificate if approved.
2. Use kubernetes SDK to automatically approve CSR and then return the certificate.hundreds-article-77945
01/18/2022, 1:48 PMripe-shampoo-80285
01/23/2022, 1:53 AMripe-shampoo-80285
01/23/2022, 2:32 AMmost-portugal-2672
02/03/2022, 2:12 PM_, err := network.NewVirtualNetwork(ctx, "virtualNetwork", &network.VirtualNetworkArgs{
AddressSpace: &network.AddressSpaceArgs{
AddressPrefixes: pulumi.StringArray{
pulumi.String("10.0.0.0/16"),
},
},
Location: pulumi.String("eastus"),
ResourceGroupName: pulumi.String("rg1"),
Subnets: []network.SubnetArgs{
&network.SubnetArgs{
AddressPrefix: pulumi.String("10.0.0.0/24"),
Name: pulumi.String("test-1"),
},
},
VirtualNetworkName: pulumi.String("test-vnet"),
})
For the "Subnets" field, however, the network.SubnetArgs
type doesn't seem qualify as a network.SubnetTypeArrayInput
because it does implement a method called `ToSubnetTypeArrayOutput`:most-portugal-2672
02/03/2022, 2:13 PMcurved-morning-41391
02/03/2022, 11:04 PMpulumi.String
instead of just a Go string?proud-angle-89904
02/03/2022, 11:13 PMproud-angle-89904
02/03/2022, 11:14 PMproud-angle-89904
02/03/2022, 11:14 PMproud-angle-89904
02/03/2022, 11:14 PMquiet-laptop-13439
02/04/2022, 10:29 AM[]*ec2.Subnet
array, and want to write a simple filter based on tags. The problem is, that filtering needs to happen inside of unwrapped ApplyT
on tags in the subnet for loop, but the best I can get out of apply outside pulumi.BoolOutput
to see if tag is present, and I don't see how can I use this on the subnet. What am I missing?prehistoric-area-95664
02/04/2022, 3:41 PMboundless-telephone-98269
02/06/2022, 8:37 PMboundless-telephone-98269
02/06/2022, 8:37 PMbusy-island-31180
02/08/2022, 3:38 AMorange-policeman-59119
02/08/2022, 6:51 AMbored-table-20691
02/08/2022, 8:13 AMlate-energy-66663
02/08/2022, 2:33 PMMachine 1
hostname: <http://ec2-15-161-152-141.eu-south-1.compute.amazonaws.com|ec2-15-161-152-141.eu-south-1.compute.amazonaws.com>
Public ip : 15.161.152.141
Machine2
hostname: <http://ec2-15-160-154-234.eu-south-1.compute.amazonaws.com|ec2-15-160-154-234.eu-south-1.compute.amazonaws.com>
Public ip : 15.160.154.234
Current Code :
var nodeList []*ec2.Instance
for i := 1; i <= args.NumberOfNodes; i++ {
vm.Instance, err = ec2.NewInstance(ctx, fmt.Sprintf("machine-%d", i), &ec2.InstanceArgs{
Tags: pulumi.StringMap{"Name": pulumi.String(fmt.Sprintf("kafka-%d", i))},
//InstanceType: pulumi.String("t3.large"),
InstanceType: args.InstanceType,
VpcSecurityGroupIds: pulumi.StringArray{vm.SecurityGroup.ID()},
Ami: pulumi.String("ami-0f8ce9c417115413d"),
UserData: userData,
KeyName: deployer.KeyName,
})
if err != nil {
panic("error creating ec2 instance")
}
nodeList = append(nodeList, vm.Instance)
}
for k, v := range nodeList {
ctx.Export("publicIp"+strconv.Itoa(k), v.PublicIp)
ctx.Export("publicHostName"+strconv.Itoa(k), v.PublicDns)
}
Current Outputs:
publicHostName0: "<http://ec2-15-161-152-141.eu-south-1.compute.amazonaws.com|ec2-15-161-152-141.eu-south-1.compute.amazonaws.com>"
publicHostName1: "<http://ec2-15-160-154-234.eu-south-1.compute.amazonaws.com|ec2-15-160-154-234.eu-south-1.compute.amazonaws.com>"
publicIp0 : "15.161.152.141"
publicIp1 : "15.160.154.234"
billions-judge-9412
02/08/2022, 6:59 PMbillions-judge-9412
02/08/2022, 7:00 PMbillions-judge-9412
02/09/2022, 2:35 AMbillions-judge-9412
02/09/2022, 1:58 PMquiet-wolf-18467
billions-judge-9412
02/09/2022, 2:37 PMquiet-wolf-18467
ripe-shampoo-80285
02/09/2022, 7:44 PMbillions-judge-9412
02/10/2022, 9:03 AMbillions-judge-9412
02/10/2022, 10:07 AM