#terraform-aws-modules (2018-11)

terraform Terraform Modules

Discussions related to https://github.com/terraform-aws-modules

Archive: https://archive.sweetops.com/terraform-aws-modules/

2018-11-07

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
06:11:57 AM

@Erik Osterman (Cloud Posse) has joined the channel

joshmyers avatar
joshmyers
06:45:06 AM

@joshmyers has joined the channel

solairerove avatar
solairerove
07:06:51 AM

@solairerove has joined the channel

maarten avatar
maarten
07:25:34 AM

@maarten has joined the channel

Nikola Velkovski avatar
Nikola Velkovski
07:27:03 AM

@Nikola Velkovski has joined the channel

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I know we’ve been pretty focused on CloudPosse modules, but I want to see if we could enable some a group collaboration for other projects

rms1000watt avatar
rms1000watt
07:36:49 AM

@rms1000watt has joined the channel

2018-11-08

endofcake avatar
endofcake
08:12:33 AM

@endofcake has joined the channel

joshmyers avatar
joshmyers

I’m in the middle of a TF module for a serverless AWS photo gallery driven by dumping images into S3 :D

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Related but not related, came across this the other day: https://github.com/awslabs/serverless-image-handler

awslabs/serverless-image-handler

A solution to dynamically handle images on the fly, utilizing Thumbor (thumbor.org) - awslabs/serverless-image-handler

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Run Thunbor on lambda

joshmyers avatar
joshmyers

Oh, thumbor looks nice

Andy avatar
Andy
11:04:30 AM

@Andy has joined the channel

Steven avatar
Steven
01:33:34 PM

@Steven has joined the channel

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
01:33:46 PM

@Andriy Knysh (Cloud Posse) has joined the channel

nian avatar
nian
04:34:03 PM

@nian has joined the channel

Yoann avatar
Yoann
07:23:29 PM

@Yoann has joined the channel

mmarseglia avatar
mmarseglia
10:14:22 PM

@mmarseglia has joined the channel

davidvasandani avatar
davidvasandani
11:36:05 PM

@davidvasandani has joined the channel

Pablo Costa avatar
Pablo Costa
01:04:44 AM

@Pablo Costa has joined the channel

2018-11-09

g0nz0 avatar
g0nz0
11:25:22 AM

@g0nz0 has joined the channel

pecigonzalo avatar
pecigonzalo
12:57:27 PM

@pecigonzalo has joined the channel

2018-11-10

antonbabenko avatar
antonbabenko
06:05:02 PM

@antonbabenko has joined the channel

antonbabenko avatar
antonbabenko

I should join this channel, though don’t expect a lot of attention from me unless you mention my username

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Hi @antonbabenko , nice to have you here :)

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Ya no worries Anton - don’t expect much activity right now

1

2018-11-12

maarten avatar
maarten

@antonbabenko Hi Anton, I’ve always used this as egress with your modules, since updating last terraform I’m getting continuous updates. Just to check with you.. this is alright correct ?

  egress_with_cidr_blocks = [
      {
        rule        = "all-all"
        cidr_blocks = "0.0.0.0/0"
      },
    ]
jonboulle avatar
jonboulle
02:11:20 PM

@jonboulle has joined the channel

maarten avatar
maarten

Maybe AWS changed something ? This is how it’s defined in the module and has always been working: all-all = [-1, -1, “-1”, “All protocols”]

maarten avatar
maarten

Now it seems that with -1 protocol aws still wants from_port and to_port to be both 0

jonboulle avatar
jonboulle

oops

jonboulle avatar
jonboulle

@maarten yeah I ran into something similar last week with a different API

jonboulle avatar
jonboulle

99.9% sure it’s an AWS change

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

looks like it does require ports be set to 0 if protocol=-1

antonbabenko avatar
antonbabenko

Hi guys. I can’t verify this now, but I saw very recently a PR in terraform aws provider which is very much related to this. Maybe there is a breaking change.

antonbabenko avatar
antonbabenko
resource/aws_security_group_rule: Properly handle updating description when protocol is -1/ALL by bflad · Pull Request #6407 · terraform-providers/terraform-provider-aws

Fixes #1920 Previously: — FAIL: TestAccAWSSecurityGroupRule_Description_AllPorts (21.74s) testing.go Step 2 error: Error applying: 1 error occurred: * aws_security_group_rule.te…

jonboulle avatar
jonboulle

doh

Gabe avatar
Gabe
05:11:29 PM

@Gabe has joined the channel

2018-11-14

Kasun avatar

hey

Kasun avatar
  • aws_elasticsearch_domain_policy.default: InvalidTypeException: Error setting policy: [{ “Version”: “2012-10-17”, “Statement”: [ { “Sid”: “”, “Effect”: “Allow”, “Action”: [ “es:ESHttpPut”, “es:ESHttpPost”, “es:ESHttpGet” ], “Resource”: [ “arnawsesXXXXX:domain/new-test-es/*”, “arnawsesXXXXX:domain/new-test-es” ], “Principal”: { “AWS”: “arnawsiam:XXXXXXinstance-profile/kasun-role” } } ] }] status code: 409, request id: b46c5087-e7ee-11e8-8ec7-21744bcecad8
Kasun avatar

after running terraform

maarten avatar
maarten

Hey Kasun, maybe explain what the problem is and with which Module of terraform-aws-modules and then maybe someone can help you out.

Kasun avatar
cloudposse/terraform-aws-elasticsearch

Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash. - cloudposse/terraform-aws-elasticsearch

Kasun avatar

ecs already created

Kasun avatar

but i could access it publicly

Kasun avatar

seems that dns resolve the vpc ip address .. anyway to access kibana in publicly

maarten avatar
maarten

Ah ok, move it to #terraform , this channel was specifically made for modules of https://github.com/terraform-aws-modules/

Terraform AWS modules

Collection of Terraform AWS modules supported by the community - Terraform AWS modules

    keyboard_arrow_up