#pr-reviews (2024-09)
Pull Request Reviews for Cloud Posse Projects
2024-09-03
Small PR to fix a typo in terraform-aws-ecs-cloudwatch-sns-alarms/
.
Hight
-> High
what
Fix typo in alarm description
approved and merged, thanks @Lennart Goedhart
Hight
-> High
what
Fix typo in alarm description
2024-09-05
PR to enable the dualstack support in the RDS
https://github.com/cloudposse/terraform-aws-rds-cluster/pull/231
what
why
references
@Ben Smith (Cloud Posse) PR is passed. can you please check now
Merged
2024-09-06
PR to add the throughput
variable for block device tuning on ecs clusters https://github.com/cloudposse/terraform-aws-ecs-cluster/pull/53
what
This change adds the through put option to the ebs block_device_mappints object in the capacity_providers_fargate_ec2 variable
why
Support to tune the throughput of the ebs volumes was added to the autoscaling group module in version 0.37.1. As it is not defined in the option block here its not passed through during an execution.
references
Release notes for 0.37.1 of cloudposse/terraform-aws-ec2-autoscale-group
Closes #52
@Ben Smith (Cloud Posse)
what
This change adds the through put option to the ebs block_device_mappints object in the capacity_providers_fargate_ec2 variable
why
Support to tune the throughput of the ebs volumes was added to the autoscaling group module in version 0.37.1. As it is not defined in the option block here its not passed through during an execution.
references
Release notes for 0.37.1 of cloudposse/terraform-aws-ec2-autoscale-group
Closes #52
@Igor Rodionov
I guess these got pulled in during the merge from main, I’ve updated them regardless as its a trivial update
@Ben Smith (Cloud Posse) @Igor Rodionov bumping this up
Is there a step I have missed here? Looks like the terratest has not completed but I am not sure why
Merged. These changes were released in v0.7.0.
2024-09-08
what
RDS cluster can be run in two network modes - IPV4 or DUAL.
Underlying module already supports this parameter
why
It can be mandatory to enable it to be able to connect from ipv6 only runtimes
references
Closes #175
2024-09-09
2024-09-10
2024-09-11
what
This avoids a situation where the reader endpoint tries to use coalesce(null, null, null)
when in cluster mode and instead uses the configuration endpoint.
why
When using cluster mode there is no reader endpoint so the output tries to use coalesce(null, null, null)
which results in a plan error. As outlined in the AWS docs the config endpoint should be used instead when in cluster mode.
references
Closes #236
@Ben Smith (Cloud Posse) @Igor Rodionov
what
This avoids a situation where the reader endpoint tries to use coalesce(null, null, null)
when in cluster mode and instead uses the configuration endpoint.
why
When using cluster mode there is no reader endpoint so the output tries to use coalesce(null, null, null)
which results in a plan error. As outlined in the AWS docs the config endpoint should be used instead when in cluster mode.
references
Closes #236
Can someone run the terratest again on following PR
Error: reading Route 53 Hosted Zone (Z04545531TH4B1BZM9PY8): couldn’t find resource https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1099 │ https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1100 │ with module.redis.module.dns.aws_route53_record.default[0], https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1101 │ on .terraform/modules/redis.dns/main.tf line 15, in resource “aws_route53_record” “default”: https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1102 │ 15: resource “aws_route53_record” “default” { https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1103 │ https://github.com/cloudposse/terraform-aws-elasticache-redis/actions/runs/10830359174/job/30049986131#step<i class="em em-12"1104 ╵}
@Ben Smith (Cloud Posse) @Igor Rodionov
2024-09-12
2024-09-13
2024-09-14
what
Allow IPv6 communication b/w VPCs over VPC peering
why
Application hosted in VPC-1 wants to access resources hosted in private subnet of VPC-2 over IPv6.
references