Replies: 9 comments
-
Hey @cornerman I don't see any problems with adding a config key such as template_bucket:
name: bucketA
region: eu-west-1
acl: private
lifecycle_configuration:
- Expiration:
Days: 10
... if we added support for the key This would also resolve #728 in a more backward-compatible friendly way. I'm probably going to close out #728 in favour of this suggested implementation - not because #728 is a bad idea but because I don't know what we would end up breaking in others setups with going straight to private buckets, probably best to give it as an option. |
Beta Was this translation helpful? Give feedback.
-
Something worth considering along with this is enabling server side encryption by default as mentioned in #491
|
Beta Was this translation helpful? Give feedback.
-
@craighurley absolutely! Well remembered. Could easily incorporate encryption preferences into this new way of specifying config. Think I will close out #491 in favour of this ticket but will make sure to allow setting of encryption here. |
Beta Was this translation helpful? Give feedback.
-
@ngfgrant Agreed, configuring the bucket directly is more generic and enables even more use-cases. I like the idea of a Just one question: In my setup, I am deploying to two different accounts. Therefore I switch between two different I see three solutions: (1) I restructure my stack-groups, such that I have a different top-level folder for each account in order to define the What do you think? |
Beta Was this translation helpful? Give feedback.
-
I thought about my setup more and I think the proposal with |
Beta Was this translation helpful? Give feedback.
-
Would it be possible to somehow make the I have code like this in stack-groups that are deployed to different accounts, because I need to keep the bucket name unique: profile: {{ var.AWS_Profile }}
template_bucket_name: My-{{ var.AWS_Profile }}-cloudformation-templates What do guys do in these situations? Have cross-account access to one bucket or have a bucket in each account? |
Beta Was this translation helpful? Give feedback.
-
I think we are going to the leave the |
Beta Was this translation helpful? Give feedback.
-
@ngfgrant I would keep the I think, it is possible to do this in a backwards compatible way. If there is only |
Beta Was this translation helpful? Give feedback.
-
@cornerman We have many AWS accounts and we share templates across accounts. We don't rely on sceptre to create the |
Beta Was this translation helpful? Give feedback.
-
I would like to add a lifecycle configuration to the template bucket, because it does not make sense for me to keep old cloudformation templates forever.
Currently, I can only set the
template_bucket_name
and it will be created automatically if it does not exist. To influence the bucket configuration right now, I could either change the bucket viaaws-cli
once after it is created or create the bucket myself in a separate cloudformation stack prior to the sceptre deployment.But I would love to integrate this step this within my sceptre deployment. Does it make sense to add a stack-group config for lifecycle configuration of the template bucket, so it can be done automatically? Or could we aim for a more generic approach where I can provide a cloudformation template for creating the template bucket, like
template_bucket_stack: !stack_output some/bucket.yaml::BucketName
?Beta Was this translation helpful? Give feedback.
All reactions