Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IamInstanceProfile option ignored in create / deploy #98

Open
jonnixt17 opened this issue Dec 2, 2021 · 3 comments
Open

IamInstanceProfile option ignored in create / deploy #98

jonnixt17 opened this issue Dec 2, 2021 · 3 comments

Comments

@jonnixt17
Copy link

Description

When using .ebextensions custom configs I provide a value for the property IamInstanceProfile under the aws:autoscaling:launchconfiguration namespace. When calling eb create or eb deploy this value is ignored and instead uses the default aws-elasticbeanstalk-ec2-role role. If I edit the config via eb config and set the IamInstanceProfile property to null, it correctly sets the role according to what is in .ebextensions suggesting the config files themselves are fine.

Steps to reproduce

Any standard setup, with the addition of an .ebextensions config file including the content:

option_settings:
    aws:autoscaling:launchconfiguration:
        IamInstanceProfile: name-of-an-existing-profile

Run eb create with usual params, making sure no -ip flag is provided.

Expected result

Would expect the environment to be created or updated with the value existing in the relevant namespace option.

Additional environment details (Ex: Windows, Mac, Amazon Linux etc)

  1. OS: Amazon Linux 2
  2. EBCLI version: 3.20.2
@florianlh
Copy link

I ran into similar issues with my projects, and this is documented behavior (although it can be surprising):

@jonnixt17
Copy link
Author

Ah yes you're right, I can see towards the bottom there are two options in that namespace that have recommended values set, though I'm unsure why this "recommended" value should override my explicit definition when creating the environment, at that point it's mandated, not recommended. Though I suppose the same goes for all of those recommended values.

Perhaps since it is documented this should be considered a feature request rather than a bug report.

@Ati59
Copy link

Ati59 commented May 16, 2022

Same in here. And that's a big limitation to me as it defined permissions of EB's EC2 and services so it should be done everytime. Making partial IaC is useless.
In the documentation, no workaround is proposed. And using another CLI to get rid of others CLI limitations is a very poor experience. Having to use sam cli, aws cli, eb cli and web console make things really complex.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants