Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS::EC2::EIP - support tagging #84

Closed
gjenkins8 opened this issue Aug 2, 2019 · 10 comments
Closed

AWS::EC2::EIP - support tagging #84

gjenkins8 opened this issue Aug 2, 2019 · 10 comments
Labels
networking & content deliv VPC, CloudFront, Route 53, API Gateway, Direct Connect, AWS App Mesh, etc.
Milestone

Comments

@gjenkins8
Copy link

1. Title

AWS::EC2::EIP - support tagging

2. Scope of request

AWS::EC2::EIP resource lacks tagging support within CloudFormation. Instead, newly created EIPs must be tagged via API post-creation (e.g. with a lambda).

This applies both to stack level tags, and the ability to supply tags as a property.

3. Expected behavior

EIPs created within a stack should receive stack level tags, and have the ability to add tags via the template:

Type: AWS::EC2::EIP
Properties: 
  Tags:
  -  Key: "Name"
  -  Value: "Subnet1 NAT Egress"

4. Suggest specific test cases

5. Helpful Links to speed up research and evaluation

Stack Overflow question: https://stackoverflow.com/questions/49993354/awselastic-ip-assign-a-name-to-an-elastic-ip-using-cloudformation

Forum feature request (from 2012!!!): https://forums.aws.amazon.com/thread.jspa?threadID=96348

6. Category (required) - Will help with tagging and be easier to find by other users to +1

  1. Compute (EC2, ECS, EKS, Lambda...)

7. Any additional context (optional)

@TheDanBlanco TheDanBlanco added the networking & content deliv VPC, CloudFront, Route 53, API Gateway, Direct Connect, AWS App Mesh, etc. label Aug 2, 2019
@whereisaaron
Copy link

Woohoo! Been waiting actual years for this one! 🎉

It’s one of CloudFormation limitations holding back the eksctl project also: eksctl-io/eksctl#778

This roadmap project is fantastic to have. I must admit, I don’t really understand why the CF team doesn’t know about API changes in advance, nor why Terraform can consistently stay 1-2 years ahead of CF in AWS API coverage. From the outside, as a customer, it seems weird? Is CF just under-resourced and/or unloved within AWS?

@dannosaur
Copy link

I've literally just stumbled across the fact that this doesn't exist in CFN. Why is CFN so slow to implement fundamental features?

@luiseduardocolon luiseduardocolon moved this from Researching to We're working on it in coverage-roadmap Oct 18, 2019
@luiseduardocolon luiseduardocolon moved this from We're working on it to Coming Soon in coverage-roadmap Nov 7, 2019
@luiseduardocolon luiseduardocolon moved this from Coming Soon to Shipped in coverage-roadmap Nov 26, 2019
@gjenkins8
Copy link
Author

👍

@seittema
Copy link

Be careful, we are seeing strange behavior with updating our EIP to add tags. After updating a stack to add tags to an existing EIP, we are seeing the EIP dissociated itself with the EC2 instance that it was attached to. Unsure if it's something we are doing or CFT but its caused issues for us at the moment.

@whereisaaron
Copy link

Thanks @seittema, if you can replicate it, I suggest you open a new issue for it here and also report it to AWS support.

@seittema
Copy link

seittema commented Dec 2, 2019

@whereisaaron Already have ticket in with AWS support and they confirmed they can replicate, it's with the AWS internal CFT now.

@damnhandy
Copy link

@seittema I wonder if you're hitting a similar issue that I am where simply adding tags forces a replacement rather than updating the EIP resource. See issue #309

@seittema
Copy link

@damnhandy Yup same issue, if the EIP is associated with a resource that you cannot disassociate with, for instance a Manage NAT Gateway, then you get the error ec2:disassociateAddress, however if the EIP is associated with a resource that it is allowed to dissociate from, for example a running EC2 instance, then it actually disassociates the EIP and returns a success which if you depend on that EIP on that application breaks your environment.

@whereisaaron
Copy link

This may be fixed @damnhandy @seittema, I was able to use Cloudformation to add tags to EIP associated with NAT gateways yesterday. No error or disassociation.

@seittema
Copy link

seittema commented May 4, 2020

@whereisaaron Yes this was fixed around 3/6

@craigataws craigataws added this to the cov milestone Jul 21, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
networking & content deliv VPC, CloudFront, Route 53, API Gateway, Direct Connect, AWS App Mesh, etc.
Projects
coverage-roadmap
  
Shipped
Development

No branches or pull requests

8 participants