-
Notifications
You must be signed in to change notification settings - Fork 313
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configure s3 bucket for templates #730
Comments
Hey @cornerman I don't see any problems with adding a config key such as template_bucket:
name: bucketA
region: eu-west-1
acl: private
lifecycle_configuration:
- Expiration:
Days: 10
... if we added support for the key This would also resolve #728 in a more backward-compatible friendly way. I'm probably going to close out #728 in favour of this suggested implementation - not because #728 is a bad idea but because I don't know what we would end up breaking in others setups with going straight to private buckets, probably best to give it as an option. |
Something worth considering along with this is enabling server side encryption by default as mentioned in #491
|
@craighurley absolutely! Well remembered. Could easily incorporate encryption preferences into this new way of specifying config. Think I will close out #491 in favour of this ticket but will make sure to allow setting of encryption here. |
@ngfgrant Agreed, configuring the bucket directly is more generic and enables even more use-cases. I like the idea of a Just one question: In my setup, I am deploying to two different accounts. Therefore I switch between two different I see three solutions: (1) I restructure my stack-groups, such that I have a different top-level folder for each account in order to define the What do you think? |
I thought about my setup more and I think the proposal with |
Would it be possible to somehow make the I have code like this in stack-groups that are deployed to different accounts, because I need to keep the bucket name unique: profile: {{ var.AWS_Profile }}
template_bucket_name: My-{{ var.AWS_Profile }}-cloudformation-templates What do guys do in these situations? Have cross-account access to one bucket or have a bucket in each account? |
I think we are going to the leave the |
@ngfgrant I would keep the I think, it is possible to do this in a backwards compatible way. If there is only |
@cornerman We have many AWS accounts and we share templates across accounts. We don't rely on sceptre to create the |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
I would like to add a lifecycle configuration to the template bucket, because it does not make sense for me to keep old cloudformation templates forever.
Currently, I can only set the
template_bucket_name
and it will be created automatically if it does not exist. To influence the bucket configuration right now, I could either change the bucket viaaws-cli
once after it is created or create the bucket myself in a separate cloudformation stack prior to the sceptre deployment.But I would love to integrate this step this within my sceptre deployment. Does it make sense to add a stack-group config for lifecycle configuration of the template bucket, so it can be done automatically? Or could we aim for a more generic approach where I can provide a cloudformation template for creating the template bucket, like
template_bucket_stack: !stack_output some/bucket.yaml::BucketName
?The text was updated successfully, but these errors were encountered: