rapid-ability-26103
12/18/2023, 7:33 PMbillions-river-87988
12/18/2023, 7:39 PMrapid-ability-26103
12/18/2023, 7:41 PMbillions-river-87988
12/18/2023, 7:50 PMaws-auth
configmap: https://www.pulumi.com/ai/conversations/b10f8c0d-f785-44b7-9362-7b21e505c0c6?prompt=Create+an+kubernetes.core%2Fv1.ConfigMapPatch+resourcebillions-river-87988
12/18/2023, 7:58 PMrapid-ability-26103
12/18/2023, 8:12 PMimport * as k8sHelm from "@pulumi/kubernetes/helm";
resource: k8sHelm.v3.Chart
Seems also that dependsOn option wont take effect herebillions-river-87988
12/18/2023, 8:15 PMbillions-river-87988
12/18/2023, 8:27 PMdependsOn
is supposed to work in this case- can you give me a more detailed example?rapid-ability-26103
12/18/2023, 8:35 PMrapid-ability-26103
12/18/2023, 9:16 PMerror: resource kube-system/aws-auth was not successfully created by the Kubernetes API server : Server-Side Apply field conflict detected. see <https://www.pulumi.com/registry/packages/kubernetes/how-to-guides/managing-resources-with-server-side-apply/#handle-field-conflicts-on-existing-resources> for troubleshooting help
: Apply failed with 1 conflict: conflict with "pulumi-kubernetes" using v1: .data.mapRoles
const awsAuthConfigMapData = pulumi.output(cluster.core.cluster.arn).apply(arn => JSON.stringify({
"groups": ["system:masters", "system:bootstrappers"],
"rolearn": arn,
"username": "system:node:{{EC2PrivateDNSName}}",
}));
const awsAuthConfigMap = new k8s.core.v1.ConfigMapPatch("aws-auth", {
metadata: {
name: "aws-auth",
namespace: "kube-system",
},
data: {
mapRoles: awsAuthConfigMapData,
},
}, { provider: provider, dependsOn: [cluster] });
billions-river-87988
12/18/2023, 9:22 PMPULUMI_K8S_ENABLE_PATCH_FORCE="true" pulumi up
it will tell k8s that pulumi is now in charge of .data.mapRoles
also be sure you are merging existing role data with your new one (like in your original example).