Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Workflow failure: cron #1395

Closed
pulumi-bot opened this issue Sep 26, 2024 · 4 comments
Closed

Workflow failure: cron #1395

pulumi-bot opened this issue Sep 26, 2024 · 4 comments
Assignees
Labels
kind/engineering Work that is not visible to an external user needs-triage Needs attention from the triage team p1 A bug severe enough to be the next item assigned to an engineer resolution/fixed This issue was fixed

Comments

@pulumi-bot
Copy link
Contributor

pulumi-bot commented Sep 26, 2024

Workflow Failure

cron has failed. See the list of failures below:

@pulumi-bot pulumi-bot added kind/engineering Work that is not visible to an external user needs-triage Needs attention from the triage team p1 A bug severe enough to be the next item assigned to an engineer labels Sep 26, 2024
@t0yv0
Copy link
Member

t0yv0 commented Sep 26, 2024

      	* creating Auto Scaling Launch Configuration (example-aws-profile-role-py-nodeLaunchConfiguration-75f1fc3): operation error Auto Scaling: CreateLaunchConfiguration, https response error StatusCode: 400, RequestID: e086d096-0808-4bf2-a5ea-0b6437f55dc9, LimitExceeded: Launch Configuration limit exceeded - You may only have 200 launch configurations

@t0yv0
Copy link
Member

t0yv0 commented Sep 26, 2024

Dug a bit deeper in here, it sounds like aws.ec2.LaunchConfiguration resource is discouraged.

https://docs.aws.amazon.com/autoscaling/ec2/userguide/launch-configurations.html

You can not call CreateLaunchConfiguration with new Amazon EC2 instance types that are released after December
31, 2022. In addition, any new accounts created on or after June 1, 2023 will not have the option to create new launch
configurations through the console. Starting on October 1, 2024, new accounts will not be able to create new launch
configurations by using the console, API, CLI, and CloudFormation. Migrate to launch templates to ensure that you don’t
need to create new launch configurations now or in the future. For information about migrating your Auto Scaling groups
to launch templates, see Migrate your Auto Scaling groups to launch templates.

However this example depends on it

eks:index:Cluster example-cluster-with-serviceiprange

With:

const cluster = new eks.Cluster(`${projectName}`, {
    vpcId: vpc.vpcId,
    publicSubnetIds: vpc.publicSubnetIds,
    desiredCapacity: 2,
    minSize: 2,
    maxSize: 2,
    nodeAmiId: "ami-0384725f0d30527c7",
    deployDashboard: false,
    enabledClusterLogTypes: [
        "api",
        "audit",
        "authenticator",
    ],
    kubernetesServiceIpAddressRange: "172.16.0.0/20"
});

There it is:

 +   pulumi:pulumi:Stack                           example-cluster-with-serviceiprang
 +   ├─ eks:index:Cluster                          example-cluster-with-serviceiprang
 +   │  ├─ eks:index:ServiceRole                   example-cluster-with-serviceiprang
 +   │  │  ├─ aws:iam:Role                         example-cluster-with-serviceiprang
 +   │  │  ├─ aws:iam:RolePolicyAttachment         example-cluster-with-serviceiprang
 +   │  │  ├─ aws:iam:RolePolicyAttachment         example-cluster-with-serviceiprang
 +   │  │  └─ aws:iam:RolePolicyAttachment         example-cluster-with-serviceiprang
 +   │  ├─ eks:index:ServiceRole                   example-cluster-with-serviceiprang
 +   │  │  ├─ aws:iam:Role                         example-cluster-with-serviceiprang
 +   │  │  └─ aws:iam:RolePolicyAttachment         example-cluster-with-serviceiprang
 +   │  ├─ eks:index:RandomSuffix                  example-cluster-with-serviceiprang
 +   │  ├─ aws:iam:InstanceProfile                 example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroup                   example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  ├─ aws:eks:Cluster                         example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroup                   example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  ├─ aws:cloudformation:Stack                example-cluster-with-serviceiprang
 +   │  ├─ eks:index:VpcCni                        example-cluster-with-serviceiprang
 +   │  ├─ pulumi:providers:kubernetes             example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  ├─ kubernetes:core/v1:ConfigMap            example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:LaunchConfiguration             example-cluster-with-serviceiprang
 +   │  ├─ aws:ec2:SecurityGroupRule               example-cluster-with-serviceiprang
 +   │  └─ pulumi:providers:kubernetes             example-cluster-with-serviceiprang

Perhaps since it's discouraged is why I could not easily find it in the Console.

I can restart for now.

@flostadler curious for your 2c here, should we track removing dep on aws.ec2.LaunchConfiguration, or did it make 3.x scope already. Thanks!

@t0yv0
Copy link
Member

t0yv0 commented Sep 27, 2024

Keeps happening so coded a cleanup for these:

https://github.com/pulumi/aws-account-cleanup/pull/79

@t0yv0
Copy link
Member

t0yv0 commented Sep 27, 2024

Applied cleanup. Should be bettter.

@t0yv0 t0yv0 added the resolution/fixed This issue was fixed label Sep 27, 2024
@t0yv0 t0yv0 self-assigned this Sep 27, 2024
@t0yv0 t0yv0 closed this as completed Sep 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/engineering Work that is not visible to an external user needs-triage Needs attention from the triage team p1 A bug severe enough to be the next item assigned to an engineer resolution/fixed This issue was fixed
Projects
None yet
Development

No branches or pull requests

2 participants