-
Notifications
You must be signed in to change notification settings - Fork 253
[Proposal] define AWS infrastructure in a separate config file #1411
Comments
Great. So in this proposal if I want to use an existing LB listener, for example, you would pass its ARN by using this dedicated file, right? Could you give more details on the format of this file, please? I looked at CoPilot but could not get it... |
Could these attributes be inferred from I stumbled on this issue by way of #921, and while I would prefer to use |
Yes please! |
What's the status of this? ETA for custom subnets? |
I am waiting also, load balancers houls load on public subnets, and normal containers or services can be on public or private subnets what is specified, second ones are used normally with EFS shares, which should also use the specified subnets per service so it matches the containers setup. |
Description
to support AWS deployment we define custom extensions
x-aws-vpc
,x-aws-loadbalancer
,x-aws-roles
... This comes with a few drawbacks:x-aws-*
attributes are not validated, and users might missuse them without being warned (see Checkfoo
implementation do support allx-foo-*
extension fields compose-spec/compose-go#66)I suggest we adopt the same approach proposed by aws copilot to define the AWS infrastructure within a dedicated file (with schema to validate content). By default, ECS intregration would behave like it does today in absence of
x-aws-*
extensions (i.e, use AWS account's default VPC) to make newcomer experience easy. Passing an AWS infrastructure file with explicit resources ARN will allow to tweak resource assignment to services. This approach can help keep the comopse file a developer-centric one while the AWS-specific one would be more operator-centricThe text was updated successfully, but these errors were encountered: