-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CloudFormation limitations #778
Comments
There’s an excellent roadmap project AWS is sharing to track the lagging support between AWS API changes and CF support. |
It looks like IAM roles can now be tagged, is that all we need? https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html#cfn-iam-role-tags
|
@whereisaaron yes, that would help, do they propagate stack tags also or only when explicitly set? |
@errordeveloper stack tag should propagate I think, if the docs are correct, but I have not tested. https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html |
Hello, Having deployed CF template using the IAM Roles 'tags' https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html#cfn-iam-role-tags I have found that the This below works when it's hardcoded
This below is not working and the same Parameter works for EC2 and Lambda resources.
|
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
This issue was closed because it has been stalled for 5 days with no activity. |
It appears that CloudFormaton cannot tag EKS control planes either. It is overlooked because worked around as a post creation task. Still, it is definitely a limitation. |
Removing prestop hook for node-driver-registrar
This issue is for tracking well-known limitation of CloudFormation that has affected eksctl in some way.
Long-standing:
Present:
Past:
The text was updated successfully, but these errors were encountered: