Discussions related to https://github.com/terraform-aws-modules Archive: https://archive.sweetops.com/terraform-aws-modules/
@Erik Osterman (Cloud Posse) I liked that we can use null as a variable value. There are the dynamic blocks and for_each loops that I can use to create optional and nested configuration blocks, but this is not straight forward in module that use resources with nested blocks with several levels.
I created the modules from scratch
@bamaral Got anything to look at? Am sure lots of folks would be interested
I’ll just move the modules from a private repository (not in github) to github and I’ll share the links here
I created Terraform 0.12 modules for several AWS resources.
I’ll create some forks hehe
@bamaral how was the overall experience?
Did you port existing modules or start from scratch?
Hey guys, I was taking a look at: https://github.com/terraform-aws-modules/terraform-aws-redshift
Terraform module which creates Redshift resources on AWS - terraform-aws-modules/terraform-aws-redshift
seems it does not support
how are you handling that? we are using a
count to check if we require snapshot copy, but feels a bit hacky
Thank you guys !!
I have seen this done by having nginx reverse proxy to an s3 bucket
@Pablo Costa Hi! This channel is for modules inside https://github.com/terraform-aws-modules/ . You can try to copy your question to #terraform , but I will answer you question anyway - no, it is not possible.
S3 websites are always public, have public URLs
Wouldn’t this work? https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-3 I think I tested it in the past and it did (not with a TF module though)
Examples of typical use cases for Amazon S3 bucket policies.
for the bucket itself yes (you can host the bucket behind a CloudFront CDN), but I think not when it’s a website (need to check that) (plain bucket and S3 website are diff things)
Yup, pretty sure I tested with website as I had a similar use case (without CloudFront)
Hello, I was planning to use terraform-aws-s3-website module for hosting a private website intended to be accessed only through VPN as a kind of intranet site, but I couldn’t find a way to filter the access. Would It be possible ?
Is there a limitation that prevented BitBucket support for
I just think it’s b/c anton didn’t have time to implement it
also because Bitbucket just sucks @imiltchman I’ve implemented it with bitbucket, but with a modified version of the module some time ago already.
let me know if you need help
@maarten Would love to see your modified version. I am also trying to figure out how to work with Fargate - how would I configure AWS credentials, for example?
The Fargate service has an IAM role, you can configure the role to have the Administrator policy, or better, to give it a policy to allow assuming roles into something Terraform works with
I agree to both of you guys - I didn’t have time and desire (aka “use case”) AND bitbucket sucks. Happy week-ends!
Really, it should be very easy to do, if there is a proper support in Terraform.