#terraform-aws-modules (2018-11)
Terraform Modules
Discussions related to https://github.com/terraform-aws-modules
Archive: https://archive.sweetops.com/terraform-aws-modules/
2018-11-07
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
@Erik Osterman (Cloud Posse) has joined the channel
![joshmyers avatar](https://avatars.slack-edge.com/2018-11-20/483958217281_8117d6f6c62807ce9912_72.jpg)
@joshmyers has joined the channel
![solairerove avatar](https://avatars.slack-edge.com/2018-12-03/493658389841_9908a9fb0b369f2f0d7f_72.jpg)
@solairerove has joined the channel
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
@maarten has joined the channel
![Nikola Velkovski avatar](https://avatars.slack-edge.com/2018-11-08/474538495603_cc9e62a39b3dbc9d8d65_72.png)
@Nikola Velkovski has joined the channel
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
I know we’ve been pretty focused on CloudPosse modules, but I want to see if we could enable some a group collaboration for other projects
![rms1000watt avatar](https://avatars.slack-edge.com/2023-12-08/6318001875107_13986079d7f8cfbeeec7_72.jpg)
@rms1000watt has joined the channel
2018-11-08
![endofcake avatar](https://avatars.slack-edge.com/2018-10-10/452404548993_bd29a395d20767858367_72.png)
@endofcake has joined the channel
![joshmyers avatar](https://avatars.slack-edge.com/2018-11-20/483958217281_8117d6f6c62807ce9912_72.jpg)
I’m in the middle of a TF module for a serverless AWS photo gallery driven by dumping images into S3 :D
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
Related but not related, came across this the other day: https://github.com/awslabs/serverless-image-handler
A solution to dynamically handle images on the fly, utilizing Thumbor (thumbor.org) - awslabs/serverless-image-handler
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
Run Thunbor on lambda
![joshmyers avatar](https://avatars.slack-edge.com/2018-11-20/483958217281_8117d6f6c62807ce9912_72.jpg)
Oh, thumbor looks nice
![Andy avatar](https://secure.gravatar.com/avatar/6cbdb6c4c1d1c345d316d38e46148ef8.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0005-72.png)
@Andy has joined the channel
![Steven avatar](https://secure.gravatar.com/avatar/85c27d283a537b0c5b54590f47293fe1.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
@Steven has joined the channel
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
@Andriy Knysh (Cloud Posse) has joined the channel
![nian avatar](https://avatars.slack-edge.com/2018-11-07/475121190983_54ee9c56bf8f4160db23_72.jpg)
@nian has joined the channel
![Yoann avatar](https://secure.gravatar.com/avatar/9509153cc85ed829359aadcd811747b5.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0006-72.png)
@Yoann has joined the channel
![mmarseglia avatar](https://secure.gravatar.com/avatar/c8ab1832c60fbfb4ad8d53b64cbeabc9.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0003-72.png)
@mmarseglia has joined the channel
![davidvasandani avatar](https://avatars.slack-edge.com/2019-10-02/784259469622_7d9e31719822afd94ef8_72.jpg)
@davidvasandani has joined the channel
![Pablo Costa avatar](https://secure.gravatar.com/avatar/9f3ab1747bd9edcebb69a05f1b056dba.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0022-72.png)
@Pablo Costa has joined the channel
2018-11-09
![g0nz0 avatar](https://secure.gravatar.com/avatar/2c2838ddf2a341d0b4f99a9ca418c958.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0016-72.png)
@g0nz0 has joined the channel
![pecigonzalo avatar](https://avatars.slack-edge.com/2020-02-24/954674862595_11f6ff71106151c32655_72.png)
@pecigonzalo has joined the channel
2018-11-10
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
@antonbabenko has joined the channel
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
I should join this channel, though don’t expect a lot of attention from me unless you mention my username
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
Hi @antonbabenko , nice to have you here :)
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
2018-11-12
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
@antonbabenko Hi Anton, I’ve always used this as egress with your modules, since updating last terraform I’m getting continuous updates. Just to check with you.. this is alright correct ?
egress_with_cidr_blocks = [
{
rule = "all-all"
cidr_blocks = "0.0.0.0/0"
},
]
![jonboulle avatar](https://avatars.slack-edge.com/2018-11-19/482971988434_588948088ea7aaeba7de_72.jpg)
@jonboulle has joined the channel
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
Maybe AWS changed something ? This is how it’s defined in the module and has always been working: all-all = [-1, -1, “-1”, “All protocols”]
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
Now it seems that with -1 protocol aws still wants from_port and to_port to be both 0
![jonboulle avatar](https://avatars.slack-edge.com/2018-11-19/482971988434_588948088ea7aaeba7de_72.jpg)
oops
![jonboulle avatar](https://avatars.slack-edge.com/2018-11-19/482971988434_588948088ea7aaeba7de_72.jpg)
@maarten yeah I ran into something similar last week with a different API
![jonboulle avatar](https://avatars.slack-edge.com/2018-11-19/482971988434_588948088ea7aaeba7de_72.jpg)
99.9% sure it’s an AWS change
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
Provides a security group resource.
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
looks like it does require ports be set to 0
if protocol=-1
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
Hi guys. I can’t verify this now, but I saw very recently a PR in terraform aws provider which is very much related to this. Maybe there is a breaking change.
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
Fixes #1920 Previously: — FAIL: TestAccAWSSecurityGroupRule_Description_AllPorts (21.74s) testing.go Step 2 error: Error applying: 1 error occurred: * aws_security_group_rule.te…
![jonboulle avatar](https://avatars.slack-edge.com/2018-11-19/482971988434_588948088ea7aaeba7de_72.jpg)
doh
![Gabe avatar](https://avatars.slack-edge.com/2018-09-18/438189792083_bdb8f075d8d0a1246f88_72.jpg)
@Gabe has joined the channel
2018-11-14
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
hey
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
- aws_elasticsearch_domain_policy.default: InvalidTypeException: Error setting policy: [{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “”,
“Effect”: “Allow”,
“Action”: [
“es:ESHttpPut”,
“es:ESHttpPost”,
“es:ESHttpGet”
],
“Resource”: [
“arn
esXXXXX:domain/new-test-es/*”, “arn
esXXXXX:domain/new-test-es” ], “Principal”: { “AWS”: “arn
iam:XXXXXXinstance-profile/kasun-role” } } ] }] status code: 409, request id: b46c5087-e7ee-11e8-8ec7-21744bcecad8
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
after running terraform
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
Hey Kasun, maybe explain what the problem is and with which Module of terraform-aws-modules and then maybe someone can help you out.
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash. - cloudposse/terraform-aws-elasticsearch
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
ecs already created
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
but i could access it publicly
![Kasun avatar](https://secure.gravatar.com/avatar/b71501d63f8f2ab89e32def29e6a2301.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0015-72.png)
seems that dns resolve the vpc ip address .. anyway to access kibana in publicly
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
Ah ok, move it to #terraform , this channel was specifically made for modules of https://github.com/terraform-aws-modules/
Collection of Terraform AWS modules supported by the community - Terraform AWS modules