#airship (2019-07)
Home of Airship ECS Modules ( https://github.com/blinkist/terraform-aws-airship-ecs-service / https://github.com/blinkist/terraform-aws-airship-ecs-cluster )
Archive: https://archive.sweetops.com/airship/
2019-07-06

I got an error on airship I believe its the multiline description on the container_secrets in variables.tf

if I remove the multiline description it resolves itself.
2019-07-08

@CumulusOps Would you be so kind and give me a sample of your module definition. I’d like to replicate it.

i was running 0.12 I did not know that would be an issue until i join the slack channel

yes, porting to 0.12 still needs to happen, but also waiting for this one to allow for a proper rewrite of the deployment mechanics. https://github.com/terraform-providers/terraform-provider-aws/pull/8652
Community Note Please vote on this pull request by adding a reaction to the original pull request comment to help the community and maintainers prioritize this request Please do not leave "…
2019-07-29

0.6.0: Mixed cluster support (#16) Switched to launch template instead of launch config.
Added support for mixed instance autoscaling groups.
Added examples
fix travis
Terraform module which creates an ECS Cluster with integrated instance scaling and EFS mounting capability - blinkist/terraform-aws-airship-ecs-cluster
2019-07-30

Hey folks - long time listener first time caller

Just getting started with Airship, but am having an issue with one of the policies. Think I’ve been staring at a screen too long but any ideas why I’m getting “MalformedPolicyDocument: The policy failed legacy parsing” for:


aws_iam_role_policy.lambda_ecs_task_scheduler_policy
BTW

Maybe @maarten or @jamie

@joshmyers Are you sure you are using eu-west-1 as region ?

@maarten yes
2019-07-31

0.9.5: It seems like AWS maybe doing some extra validation here but without … …(#70) this change, I am getting the below error [1]. As per the…
Terraform module which creates an ECS Service, IAM roles, Scaling, ALB listener rules.. Fargate & AWSVPC compatible - blinkist/terraform-aws-airship-ecs-service
what this change, I am getting the below error [1]. As per the docs [2] when using an ECS condition like ArnEquals, we need to ensure the value is an actual valid ARN of the cluster, and not just t…