#office-hours (2024-10)

“Office Hours” are every Wednesday at 11:30 PST via Zoom. It’s open to everyone. Ask questions related to DevOps & Cloud and get answers! https://cloudposse.com/office-hours

Public “Office Hours” are held every Wednesday at 11:30 PST via Zoom. It’s open to everyone. Ask questions related to DevOps & Cloud and get answers!

https://cpco.io/slack-office-hours

Meeting password: sweetops

2024-10-06

managedkaos avatar
managedkaos
Visual Subnet Calculator - Split/Join

Quickly and easily design network layouts. Split and join subnets, add notes and color, then collaborate with others by sharing a custom link to your design.

1
managedkaos avatar
managedkaos
Stephen Sennett on LinkedIn: #notthatiwouldeverdothat | 61 commentsattachment image
Visual Subnet Calculator is one of the coolest simple tools I've come across recently, and has already saved me from several nightmarish Excel…61 comments on LinkedIn

2024-10-09

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
06:04:27 PM

@here office hours is starting in 30 minutes! Remember to post your questions here.

jose.amengual avatar
jose.amengual

@Erik Osterman (Cloud Posse), you were right about Atlantis the first time, we did move to the CNCF github already, now is Slack and other things, we even added Fossa and Snyk and Dosu to our repos

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Thanks for setting the record straight

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Will correct next week

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@jose.amengual this doesn’t seem to redirect https://github.com/runatlantis/atlantis

runatlantis/atlantis

Terraform Pull Request Automation

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Nor indicate a fork in CNCF

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Also, it doesn’t appear to be an organization underneatt the CNCF enterprise

jose.amengual avatar
jose.amengual

you do not see this ?

jose.amengual avatar
jose.amengual
jose.amengual avatar
jose.amengual

runatlantis is the org

jose.amengual avatar
jose.amengual

Atlantis is one repo

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Fwiw, not seeing the banner

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Interesting, I don’t see

jose.amengual avatar
jose.amengual

maybe is because I’m owner

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

ya, could be

jose.amengual avatar
jose.amengual

you are going to have to believe me

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

haha

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

so when you go here, do you see “Part of Cloud Posse”

https://github.com/cloudposse/

Cloud Posse

DevOps Accelerator for AWS Infrastructure Hire Us! https://cloudposse.com/services

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
jose.amengual avatar
jose.amengual

I do but I’m a contributor

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

ya

jose.amengual avatar
jose.amengual

what about this? https://github.com/istio

jose.amengual avatar
jose.amengual

I see :

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Ya, so I guess since you’re a member of their enterprise, you see it

jose.amengual avatar
jose.amengual

I GOT THE POWER!!!! fast_parrot

1

2024-10-12

2024-10-15

Jonathan Eunice avatar
Jonathan Eunice

Just watched a bit of the HashiCorp live cast. Much to talk about there, but the “scaling up Terraform” with components, modules, and workflows seems to recapitulate Cloud Posse’s journey and solutions/approaches. Can’t wait to hear @Erik Osterman (Cloud Posse)’s take. Also, “deferred changes” seems magical but could be a train wreck, so… you’re up, Erik!

4
1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Yes, I think they more or less borrowed our entire lexicon but can’t say we were first to use it either. Unfortunately, I haven’t watched it yet.

Michael avatar
Michael
Amazon says 175 million customer now use passkeys to log inattachment image

Amazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature.

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Wow, I would never have imagined that many people would have set it up

Amazon says 175 million customer now use passkeys to log inattachment image

Amazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature.

2024-10-16

Rishav avatar

Outta curiosity, how does one submit a topic or two for the office-hour? Be keen to see/hear a few highlights from the HashiConf as well.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Post in this chat and we’ll try to bring it up, or attend live

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
Rishav avatar

Gotcha, thanks! I’ve already signed up and attended a few (looking forward to today’s one).

Particularly drawn in by this clip/video from yesterday, as I recently blogged about a cross-platforms GitHub Action which tries to make Terraform/Tofu provisioning pipeline a breeze.

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
06:04:04 PM

@here office hours is starting in 30 minutes! Remember to post your questions here.

2024-10-17

2024-10-20

Rishav avatar

Many thanks for sharing your space at the last Office Hours, @Erik Osterman (Cloud Posse) et al, genuinely appreciate the time.

I brought a fair few Qs about Terraform provisioning pipelines with GitHub Action, to which you added plenty of depth and potential pitfalls to look out for.

Summarize plan outline • Reviewing 1000s of lines of planned changes is simply not feasible, but a brief 1-liner like “Plan: 2 to add, 2 to change, 2 to destroy” fails to convey the scope of impact. • A “middle-ground” outline would be preferable, which accounts for character limits within PR comments, while linking to the complete output log in the workflow job summary. Plan file reuse with encryption • Too often PRs are merged with apply -auto-approve, which is optimistic at best, but liable to configuration drift from changes made outside the workflow. • While it’s best practice to reuse the plan file from plan command, storing and retrieving it between workflow runs isn’t easy, let alone if it contains sensitive data. Apply before OR after merge • Whenever we choose to apply changes, we need a way to uniquely identify and fetch the appropriate plan file outside of pull_request context. • In addition to push and pull_request_target events, support GitHub’s native merge queue feature to conditionally merge the PR only if it applies successfully. As promised, I managed to wrangle out a few hours over the weekend to pour over these problems, and address each one in turn. Drawn up my progress in a blog post—happy to share, if you’d like? (keen to not fall foul of any self-promotion rules!)

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

That would be great

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Please share

Rishav avatar

Here’s the blog post with announcement/highlights,

And the actual GitHub Action itself: TF-via-PR.

When you have a moment, would really appreciate your thoughts/feedback, especially once you’ve seen the 4 example workflows showcasing common use cases.

Enhance Terraform/Tofu Automation with GitHub Actionattachment image

Provisioning infrastructure-as-code (IaC) in a GitOps framework can feel like walking a tightrope:…

sweetops2
1
1

2024-10-21

2024-10-23

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
06:04:40 PM

@here office hours is starting in 30 minutes! Remember to post your questions here.

1
Matthew Clark avatar
Matthew Clark

When running atmos commands to apply the first time, it fails due to “account already belonging to organization”, unless we set organization_enabled to false in accounts component in catalog stack. If we set this to false, it runs - we then just renamed the existing management account to core-root. Is core-root referencing the management account, or is there an expectation that core-root is another separate account? Once we get past that - the OUs/accounts exist, but when we apply account-settings it’s implying the the account_name doesn’t exist in local.account_org_role_arns. In your experience, is this likely an issue with what I mention above re: organizations, something running in the wrong workspace and by proxy not having access to the intended tfstate, or something else?

This error is occurring in the account-map IAM roles module which is pulling from full account map from account map module.

full_account_map = {
  "core-artifacts" = "<REDACTED>"
  "core-audit" = "<REDACTED>"
  "core-dns" = "<REDACTED>"
  "core-identity" = "<REDACTED>"
  "core-root" = "<REDACTED>"
}

How would we go about debugging this? Still working our way around atmos, heh.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

This is a better question for our Customer Workshop this afternoon.

Matthew Clark avatar
Matthew Clark

haha yeah I confused the two. Sorry about that.

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

heads up @Ben Smith (Cloud Posse) @Dan Miller (Cloud Posse) for workshop later

1
Dan Miller (Cloud Posse) avatar
Dan Miller (Cloud Posse)

Assuming this is in regards to apply the account component on initial creation, you may need to import the existing organization into Terraform if it was manually created already

Dan Miller (Cloud Posse) avatar
Dan Miller (Cloud Posse)

I believe we have docs on that, checking

Dan Miller (Cloud Posse) avatar
Dan Miller (Cloud Posse)
aws organizations describe-organization
atmos terraform import account --stack core-gbl-root 'aws_organizations_organization.this[0]' 'o-7qcakq6zxw'
Matthew Clark avatar
Matthew Clark

Hey sorry my power went out. But this was great progress. I’ll keep digging into it as time permits and will send you guys order of operations on how I got it into this state

Ben Smith (Cloud Posse) avatar
Ben Smith (Cloud Posse)

Thanks! it might be helpful (hopefully things are already git controlled) but try re-vendoring (will overwrite local files) components. Our Components work with the right outputs - that might help reset to what was working before TF typechanges.

By removing the account from accounts.yaml, the “bad” account should be removed from output of account-map as well, from TF side of things, you should be good

Bob Berg avatar
Bob Berg

Could I get help on a PR review?

I previously opened an issue and flagged it as a bug, this was in August, https://github.com/cloudposse/terraform-datadog-platform/issues/100.

I submitted a pull request to fix said issue this past Monday, https://github.com/cloudposse/terraform-datadog-platform/pull/107.

Could I get some direction on where to take this and how to get it approved? It was a simple one-line-change that fixed the issue.

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

This is a best effort by a small team. We appreciate your persistence, and we’ll get to it when we can.

Bob Berg avatar
Bob Berg

Cool, thanks for the reply. This is my first time contributing to any public repository, so I’m not really sure how it goes. I have no problem waiting patiently for people’s time to free up. Thanks again for the reply.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Oh that’s great! Thanks for jumping in and taking a stab at it.

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

I created a task for it: DEV-2707: Review PR addressing Advanced Scheduling for Datadog Synthetics Non-Functional

It will sit in our backlog until we can get to it, as we can not promise on the ETA

    keyboard_arrow_up