future-air-70511
05/08/2020, 2:47 PMnew ChartArgs
{
Repo = "oteemocharts",
Chart = "sonarqube",
Namespace = namespaceName,
Values =
{
{ "image", new { tag = "8.3-community" } },
{
"postgresql",
new
{
enabled = false,
postgresqlServer = postgresqlServer.Fqdn,
postgresqlPassword = postgresqlPassword.Result,
postgresqlDatabase = postgresqlDatabase.Name,
postgresqlUsername = Output.Format( $"{postgresqlServer.AdministratorLogin}@{postgresqlServer.Name}" )
}
},
Diagnostics:
kubernetes:helm.sh:Chart (helm-sonarqube):
error: Pulumi.ResourceException: coalesce.go:195: warning: destination for postgresqlDatabase is a table. Ignoring non-table value sonarDB
coalesce.go:195: warning: destination for postgresqlPassword is a table. Ignoring non-table value sonarPass
coalesce.go:195: warning: destination for postgresqlDatabase is a table. Ignoring non-table value sonarDB
coalesce.go:195: warning: destination for postgresqlPassword is a table. Ignoring non-table value sonarPass
Error: template: sonarqube/templates/secret.yaml:14:66: executing "sonarqube/templates/secret.yaml" at <b64enc>: wrong type for value; expected string; got map[string]interface {}
Anyone have ideas what I'm doing wrong?brash-manchester-88595
05/08/2020, 3:44 PMeks.Cluster
(eg. from top level into a component resource). It’ll work almost, (with aliases: [{parent: pulumi.rootStackResource}]
), but you can’t move the nodeAccess
configmap, because it can’t find it’s provider (it’s trying to use the new provider that you don’t have yet). I can open a bug if this isn’t tracked yet, I ran into problems with refactoring providers multiple times already.
Possibly the problem is that the new provider doesn’t act like a dependency on which you have to wait. Or that the reference to the provider itself isn’t aliased (ie. the alias for the provider isn’t propagated to the dependents so that you could reference the old provider through the new urn).brash-manchester-88595
05/08/2020, 4:40 PMgorgeous-elephant-23271
05/10/2020, 1:15 PMancient-megabyte-79588
05/13/2020, 8:54 PMancient-megabyte-79588
05/13/2020, 8:56 PMconst env = pulumi.getStack(); // reference to this stack
const stackId = `dave/aks/${env}`;
const aksStack = new pulumi.StackReference(stackId);
const k8sDnsName = aksStack.getOutput("k8sDnsName"); // <-- This is "identity-auth-dev"
// Deploy ingress-controller using helm to AKS Cluster
const options = {
chart: "nginx-ingress-controller",
namespace: "kube-system",
repo: "bitnami",
values: {
annotations: {
"<http://service.beta.kubernetes.io/azure-dns-label-name|service.beta.kubernetes.io/azure-dns-label-name>": "identity-auth-dev"
},
resources: { requests : {memory: "150Mi", cpu: "100m"}},
serviceType: "LoadBalancer",
nodeCount: 1,
}
};
const nginxIngress = new k8s.helm.v3.Chart("nginx", options, {provider: k8sProvider });
ancient-megabyte-79588
05/13/2020, 8:56 PMkind-mechanic-53546
05/16/2020, 6:53 AMfaint-motherboard-95438
05/18/2020, 9:31 PMpulumi up
a Secret
created by the chart (namely the pgpool
one) keeps getting replaced each time for a ~data
diff reason. Anyone would know the reason and how to make it permanent please ? (Never had this issue with any other chart I use)incalculable-dream-27508
05/19/2020, 9:46 AMcuddly-smartphone-89735
05/19/2020, 10:23 AMazure.containerservice.KubernetesCluster
resource provides the property kubeAdminConfigRaw
which we feed directly in the k8s provider like so: let cluster = new k8s.Provider(name, {kubeconfig: aks.kubeAdminConfigRaw,})
This works perfectly fine except due to this conservative diffing https://github.com/pulumi/pulumi-kubernetes/blob/master/provider/pkg/provider/provider.go#L270 every change on the AKS resource will trigger a complete recreation of all resources that use this k8s provider instance. Note, that the kubeconfig is mostly a means of authentication, not actually something stateful itself ...
Does anyone have the same problem? Any solutions? 🙂elegant-twilight-45010
05/19/2020, 11:10 AMlimited-rainbow-51650
05/19/2020, 1:14 PMgorgeous-animal-95046
05/19/2020, 5:39 PMDeployment
which I believe has the same spec, but pulumi is giving me a diff where the entire containers
array is going to be deleted. When I dump out my deployment object in the code, it has the containers array filled in. I'm guessing i'm wrong and the state doesn't match for the import. Is this a pulumi bug where it can't diff the array contents?orange-policeman-59119
05/20/2020, 2:08 AMdeleteBeforeReplace
is not used, causing the deployment to fail because deployment names are unique within a namespace and the creation fails
I have two questions:
1. Is there a way to force the Kubernetes provider to perform an "update"?
2. Are there best practices for maintaining large lists of env vars to avoid bizarre updates like the one shown in the link above, where inserting an env var "out of order" resulted in a bizarre diff?kind-mechanic-53546
05/21/2020, 1:53 AMimportant-jackal-88836
05/22/2020, 3:35 AMsuppressDeprecationWarnings
is on by default now.wet-noon-14291
05/22/2020, 9:03 PMConfigFile
and an actual manifest. Running the manifest with kubectl apply -f
works, but it fails through pulumi. The error message is:
error: resource default was not successfully created by the Kubernetes API server : namespaces "default" already exists
So I guess pulumi does something else than kubectl apply
. Is there a way to run a manifest that updates a namespace?
The part in the code I have now looks like this (F#)
ConfigFile("proxy_inject",
ConfigFileArgs(
File = input "manifests/proxy_inject.yaml"
)) |> ignore
wet-noon-14291
05/27/2020, 9:50 AMappsettings.json
file in the frontend app, but that doesn't work since pulumi adds some characters. I guess one way could be to get the name from the environment somehow instead.wet-noon-14291
05/27/2020, 12:40 PMgorgeous-egg-16927
05/28/2020, 12:25 AMprehistoric-account-60014
05/29/2020, 4:33 PMinitContainers
? Would something like https://github.com/pulumi/pulumi-kubernetes/pull/633 help with waiting for a migration Job
to finish before deploying other resources?full-dress-10026
05/29/2020, 8:01 PMfull-dress-10026
05/29/2020, 8:12 PMfull-dress-10026
05/29/2020, 8:13 PMbillowy-army-68599
05/29/2020, 8:21 PMfull-dress-10026
05/29/2020, 8:23 PMbillowy-army-68599
05/29/2020, 8:33 PMfew-apartment-82932
06/01/2020, 2:11 PMfew-apartment-82932
06/01/2020, 2:12 PMfew-apartment-82932
06/01/2020, 2:12 PM