#terraform-aws-modules (2019-01)

terraform Terraform Modules

Discussions related to https://github.com/terraform-aws-modules Archive: https://archive.sweetops.com/terraform-aws-modules/

2019-01-30

bamaral avatar
bamaral

@Erik Osterman (Cloud Posse) I liked that we can use null as a variable value. There are the dynamic blocks and for_each loops that I can use to create optional and nested configuration blocks, but this is not straight forward in module that use resources with nested blocks with several levels.

bamaral avatar
bamaral

I created the modules from scratch

joshmyers avatar
joshmyers

@bamaral Got anything to look at? Am sure lots of folks would be interested

bamaral avatar
bamaral

I’ll just move the modules from a private repository (not in github) to github and I’ll share the links here

2019-01-29

bamaral avatar
bamaral

I created Terraform 0.12 modules for several AWS resources.

bamaral avatar
bamaral

I’ll create some forks hehe

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@bamaral how was the overall experience?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Did you port existing modules or start from scratch?

2019-01-17

pecigonzalo avatar
pecigonzalo
terraform-aws-modules/terraform-aws-redshift

Terraform module which creates Redshift resources on AWS - terraform-aws-modules/terraform-aws-redshift

pecigonzalo avatar
pecigonzalo

seems it does not support snapshot_copy feature

pecigonzalo avatar
pecigonzalo

how are you handling that? we are using a count to check if we require snapshot copy, but feels a bit hacky

antonbabenko avatar
antonbabenko

@pecigonzalo I don’t use redshift myself, can’t help much. In any case count is probably the best solution.

:--1:1
pecigonzalo avatar
pecigonzalo

yeah that is what we do with some other, but as RS was so big, I was trying to avoid doing it

antonbabenko avatar
antonbabenko

@Max This channel is for questions related to modules under https://github.com/terraform-aws-modules/ org. Consider asking in #terraform which is a better fit.

Terraform AWS modules

Collection of Terraform AWS modules supported by the community - Terraform AWS modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@Max hi, let’s move to #terraform

2019-01-14

Pablo Costa avatar
Pablo Costa

Thank you guys !!

joshmyers avatar
joshmyers

I have seen this done by having nginx reverse proxy to an s3 bucket

1

2019-01-11

antonbabenko avatar
antonbabenko

@Pablo Costa Hi! This channel is for modules inside terraform https://github.com/terraform-aws-modules/ . You can try to copy your question to #terraform , but I will answer you question anyway - no, it is not possible.

Terraform AWS modules

Collection of Terraform AWS modules supported by the community - Terraform AWS modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

S3 websites are always public, have public URLs

Andy avatar

Wouldn’t this work? https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-3 I think I tested it in the past and it did (not with a TF module though)

Bucket Policy Examples - Amazon Simple Storage Service

Examples of typical use cases for Amazon S3 bucket policies.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

for the bucket itself yes (you can host the bucket behind a CloudFront CDN), but I think not when it’s a website (need to check that) (plain bucket and S3 website are diff things)

Andy avatar

Yup, pretty sure I tested with website as I had a similar use case (without CloudFront)

2019-01-10

Pablo Costa avatar
Pablo Costa

Hello, I was planning to use terraform-aws-s3-website module for hosting a private website intended to be accessed only through VPN as a kind of intranet site, but I couldn’t find a way to filter the access. Would It be possible ?

2019-01-04

imiltchman avatar
imiltchman

Is there a limitation that prevented BitBucket support for terraform-aws-atlantis?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I just think it’s b/c anton didn’t have time to implement it

maarten avatar
maarten

also because Bitbucket just sucks @imiltchman I’ve implemented it with bitbucket, but with a modified version of the module some time ago already.

maarten avatar
maarten

let me know if you need help

imiltchman avatar
imiltchman

@maarten Would love to see your modified version. I am also trying to figure out how to work with Fargate - how would I configure AWS credentials, for example?

maarten avatar
maarten

The Fargate service has an IAM role, you can configure the role to have the Administrator policy, or better, to give it a policy to allow assuming roles into something Terraform works with

:--1:1
antonbabenko avatar
antonbabenko

I agree to both of you guys - I didn’t have time and desire (aka “use case”) AND bitbucket sucks. Happy week-ends!

2
antonbabenko avatar
antonbabenko

Really, it should be very easy to do, if there is a proper support in Terraform.

    keyboard_arrow_up