Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CloudFormation limitations #778

Closed
3 of 8 tasks
errordeveloper opened this issue May 3, 2019 · 9 comments
Closed
3 of 8 tasks

CloudFormation limitations #778

errordeveloper opened this issue May 3, 2019 · 9 comments

Comments

@errordeveloper
Copy link
Contributor

errordeveloper commented May 3, 2019

This issue is for tracking well-known limitation of CloudFormation that has affected eksctl in some way.

Long-standing:

Present:

Past:

  • EKS cluster version updates
@whereisaaron
Copy link

There’s an excellent roadmap project AWS is sharing to track the lagging support between AWS API changes and CF support.
https://github.com/aws-cloudformation/aws-cloudformation-coverage-roadmap

@whereisaaron
Copy link

It looks like IAM roles can now be tagged, is that all we need? https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html#cfn-iam-role-tags

Type: AWS::IAM::Role
Properties: 
  AssumeRolePolicyDocument: Json
  Description: String
  ManagedPolicyArns: 
    - String
  MaxSessionDuration: Integer
  Path: String
  PermissionsBoundary: String
  Policies: 
    - Policy
  RoleName: String
  Tags: 
    - Tag

@errordeveloper
Copy link
Contributor Author

@whereisaaron yes, that would help, do they propagate stack tags also or only when explicitly set?

@whereisaaron
Copy link

@errordeveloper stack tag should propagate I think, if the docs are correct, but I have not tested.

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html
"All stack-level tags, including automatically created tags, are propagated to resources that AWS CloudFormation supports. Currently, tags are not propagated to Amazon EBS volumes that are created from block device mappings."

@jimsmith
Copy link

Hello,

Having deployed CF template using the IAM Roles 'tags' https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html#cfn-iam-role-tags

I have found that the !Ref is not being honored.

This below works when it's hardcoded

Tags:
        - 
          Key: "keyname1"
          Value: "value1"
        - 
          Key: "keyname2"
          Value: "value2"

This below is not working and the same Parameter works for EC2 and Lambda resources.

Tags:
        - Key: Application
          Value: !Ref 'Application'
        - Key: Application
          Value: !Ref 'Application'

@github-actions
Copy link
Contributor

This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label Jan 27, 2021
@github-actions
Copy link
Contributor

github-actions bot commented Feb 1, 2021

This issue was closed because it has been stalled for 5 days with no activity.

@github-actions github-actions bot closed this as completed Feb 1, 2021
@duckie
Copy link

duckie commented Jun 8, 2021

It appears that CloudFormaton cannot tag EKS control planes either. It is overlooked because worked around as a post creation task. Still, it is definitely a limitation.

aws/containers-roadmap#506

torredil pushed a commit to torredil/eksctl that referenced this issue May 20, 2022
Removing prestop hook for node-driver-registrar
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants