Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add more scaling configuration #34

Merged
merged 9 commits into from Jun 3, 2022
Merged

Add more scaling configuration #34

merged 9 commits into from Jun 3, 2022

Conversation

jvisker
Copy link
Contributor

@jvisker jvisker commented Jun 3, 2022

No description provided.

@jvisker jvisker requested a review from a team June 3, 2022 16:54
@github-actions
Copy link

github-actions bot commented Jun 3, 2022

Terraform Plan:

will create 26 resources:

  • aws_efs_file_system - my_efs
  • aws_alb - alb
  • aws_alb_listener - http_to_https
  • aws_alb_listener - https
  • aws_alb_listener - test_listener
  • aws_alb_target_group - blue
  • aws_alb_target_group - green
  • aws_cloudwatch_log_group - container_log_group
  • aws_cloudwatch_log_group - xray_log_group
  • aws_codedeploy_app - app
  • aws_codedeploy_deployment_group - deploymentgroup
  • aws_ecs_cluster - new_cluster
  • aws_ecs_service - service
  • aws_ecs_task_definition - task_def
  • aws_iam_policy - secrets_access
  • aws_iam_role - task_execution_role
  • aws_iam_role - task_role
  • aws_iam_role_policy_attachment - secret_task_policy_attach
  • aws_iam_role_policy_attachment - secrets_policy_attach
  • aws_iam_role_policy_attachment - task_execution_policy_attach
  • aws_iam_role_policy_attachment - xray_task_policy_attach
  • aws_route53_record - a_record
  • aws_route53_record - aaaa_record
  • aws_security_group - alb-sg
  • aws_security_group - fargate_service_sg
  • local_file - appspec_json

see details

@github-actions
Copy link

github-actions bot commented Jun 3, 2022

Terraform Plan:

will create 26 resources:

  • aws_efs_file_system - my_efs
  • aws_alb - alb
  • aws_alb_listener - http_to_https
  • aws_alb_listener - https
  • aws_alb_listener - test_listener
  • aws_alb_target_group - blue
  • aws_alb_target_group - green
  • aws_cloudwatch_log_group - container_log_group
  • aws_cloudwatch_log_group - xray_log_group
  • aws_codedeploy_app - app
  • aws_codedeploy_deployment_group - deploymentgroup
  • aws_ecs_cluster - new_cluster
  • aws_ecs_service - service
  • aws_ecs_task_definition - task_def
  • aws_iam_policy - secrets_access
  • aws_iam_role - task_execution_role
  • aws_iam_role - task_role
  • aws_iam_role_policy_attachment - secret_task_policy_attach
  • aws_iam_role_policy_attachment - secrets_policy_attach
  • aws_iam_role_policy_attachment - task_execution_policy_attach
  • aws_iam_role_policy_attachment - xray_task_policy_attach
  • aws_route53_record - a_record
  • aws_route53_record - aaaa_record
  • aws_security_group - alb-sg
  • aws_security_group - fargate_service_sg
  • local_file - appspec_json

see details

@GaryGSC
Copy link
Member

GaryGSC commented Jun 3, 2022

The implementation looks good because you've managed to do it in a semver-minor way, but now the description for autoscaling_config is confusing, since autoscaling_config is required to be non-null to make use of these new options that let us configure autoscaling policies and alarm.

It currently reads:

Configuration for default autoscaling policies and alarms. Set to null if you want to set up your own autoscaling policies and alarms.

GaryGSC
GaryGSC previously approved these changes Jun 3, 2022
Copy link
Member

@GaryGSC GaryGSC left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm fine to move forward with this if we create an issue to refactor in a future major-version release.

@jvisker
Copy link
Contributor Author

jvisker commented Jun 3, 2022

The implementation looks good because you've managed to do it in a semver-minor way, but now the description for autoscaling_config is confusing, since autoscaling_config is required to be non-null to make use of these new options that let us configure autoscaling policies and alarm.

It currently reads:

Configuration for default autoscaling policies and alarms. Set to null if you want to set up your own autoscaling policies and alarms.

@GaryGSC I'm fine still putting an issue on the repository for a future refactor, but I did add a clarifying sentence, which dismissed your approval.

Copy link
Member

@GaryGSC GaryGSC left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a bit better now. I'd still love to eventually refactor to make use of optional object attributes, once they finally make it out of experimental status.

@GaryGSC
Copy link
Member

GaryGSC commented Jun 3, 2022

Especially once they support defaults. 🙂

@jvisker
Copy link
Contributor Author

jvisker commented Jun 3, 2022

@GaryGSC Yeah. I've been watching that feature. Unfortunately even when it does come out of experimental status it won't work with older versions of terraform.

@jvisker jvisker merged commit ecd2c6f into master Jun 3, 2022
@jvisker jvisker deleted the addScalingConfig branch June 3, 2022 17:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants