#terraform-aws-modules (2019-01)
Terraform Modules
Discussions related to https://github.com/terraform-aws-modules
Archive: https://archive.sweetops.com/terraform-aws-modules/
2019-01-04
![Igor avatar](https://avatars.slack-edge.com/2022-03-17/3244104166391_48a8db73944f03735a65_72.jpg)
Is there a limitation that prevented BitBucket support for terraform-aws-atlantis
?
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
I just think it’s b/c anton didn’t have time to implement it
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
also because Bitbucket just sucks @Igor I’ve implemented it with bitbucket, but with a modified version of the module some time ago already.
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
let me know if you need help
![Igor avatar](https://avatars.slack-edge.com/2022-03-17/3244104166391_48a8db73944f03735a65_72.jpg)
@maarten Would love to see your modified version. I am also trying to figure out how to work with Fargate - how would I configure AWS credentials, for example?
![maarten avatar](https://avatars.slack-edge.com/2020-09-28/1393040065826_b0d13cfde15deff02026_72.png)
The Fargate service has an IAM role, you can configure the role to have the Administrator policy, or better, to give it a policy to allow assuming roles into something Terraform works with
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
I agree to both of you guys - I didn’t have time and desire (aka “use case”) AND bitbucket sucks. Happy week-ends!
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
Really, it should be very easy to do, if there is a proper support in Terraform.
2019-01-10
![Pablo Costa avatar](https://secure.gravatar.com/avatar/9f3ab1747bd9edcebb69a05f1b056dba.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0022-72.png)
Hello, I was planning to use terraform-aws-s3-website module for hosting a private website intended to be accessed only through VPN as a kind of intranet site, but I couldn’t find a way to filter the access. Would It be possible ?
2019-01-11
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
@Pablo Costa Hi! This channel is for modules inside https://github.com/terraform-aws-modules/ . You can try to copy your question to #terraform , but I will answer you question anyway - no, it is not possible.
Collection of Terraform AWS modules supported by the community - Terraform AWS modules
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
S3 websites are always public, have public URLs
![Andy avatar](https://secure.gravatar.com/avatar/6cbdb6c4c1d1c345d316d38e46148ef8.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0005-72.png)
Wouldn’t this work? https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-3 I think I tested it in the past and it did (not with a TF module though)
Examples of typical use cases for Amazon S3 bucket policies.
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
for the bucket itself yes (you can host the bucket behind a CloudFront CDN), but I think not when it’s a website (need to check that) (plain bucket and S3 website are diff things)
![Andy avatar](https://secure.gravatar.com/avatar/6cbdb6c4c1d1c345d316d38e46148ef8.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0005-72.png)
Yup, pretty sure I tested with website as I had a similar use case (without CloudFront)
2019-01-14
![Pablo Costa avatar](https://secure.gravatar.com/avatar/9f3ab1747bd9edcebb69a05f1b056dba.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0022-72.png)
Thank you guys !!
![joshmyers avatar](https://avatars.slack-edge.com/2018-11-20/483958217281_8117d6f6c62807ce9912_72.jpg)
2019-01-17
![pecigonzalo avatar](https://avatars.slack-edge.com/2020-02-24/954674862595_11f6ff71106151c32655_72.png)
Hey guys, I was taking a look at: https://github.com/terraform-aws-modules/terraform-aws-redshift
Terraform module which creates Redshift resources on AWS - terraform-aws-modules/terraform-aws-redshift
![pecigonzalo avatar](https://avatars.slack-edge.com/2020-02-24/954674862595_11f6ff71106151c32655_72.png)
seems it does not support snapshot_copy
feature
![pecigonzalo avatar](https://avatars.slack-edge.com/2020-02-24/954674862595_11f6ff71106151c32655_72.png)
how are you handling that? we are using a count
to check if we require snapshot copy, but feels a bit hacky
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
@pecigonzalo I don’t use redshift myself, can’t help much. In any case count
is probably the best solution.
![pecigonzalo avatar](https://avatars.slack-edge.com/2020-02-24/954674862595_11f6ff71106151c32655_72.png)
yeah that is what we do with some other, but as RS was so big, I was trying to avoid doing it
![antonbabenko avatar](https://secure.gravatar.com/avatar/fc9fce3c16a287d672ec5433430f11ca.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0011-72.png)
@Max This channel is for questions related to modules under https://github.com/terraform-aws-modules/ org. Consider asking in #terraform which is a better fit.
Collection of Terraform AWS modules supported by the community - Terraform AWS modules
![Andriy Knysh (Cloud Posse) avatar](https://avatars.slack-edge.com/2018-06-13/382332470551_54ed1a5d986e2068fd9c_72.jpg)
@Max hi, let’s move to #terraform
2019-01-29
![bamaral avatar](https://avatars.slack-edge.com/2019-01-29/535277651168_f4e9a5bfcc87a7658678_72.jpg)
I created Terraform 0.12 modules for several AWS resources.
![bamaral avatar](https://avatars.slack-edge.com/2019-01-29/535277651168_f4e9a5bfcc87a7658678_72.jpg)
I’ll create some forks hehe
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
@bamaral how was the overall experience?
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
Did you port existing modules or start from scratch?
2019-01-30
![bamaral avatar](https://avatars.slack-edge.com/2019-01-29/535277651168_f4e9a5bfcc87a7658678_72.jpg)
@Erik Osterman (Cloud Posse) I liked that we can use null as a variable value. There are the dynamic blocks and for_each loops that I can use to create optional and nested configuration blocks, but this is not straight forward in module that use resources with nested blocks with several levels.
![bamaral avatar](https://avatars.slack-edge.com/2019-01-29/535277651168_f4e9a5bfcc87a7658678_72.jpg)
I created the modules from scratch
![joshmyers avatar](https://avatars.slack-edge.com/2018-11-20/483958217281_8117d6f6c62807ce9912_72.jpg)
@bamaral Got anything to look at? Am sure lots of folks would be interested
![bamaral avatar](https://avatars.slack-edge.com/2019-01-29/535277651168_f4e9a5bfcc87a7658678_72.jpg)
I’ll just move the modules from a private repository (not in github) to github and I’ll share the links here