#terraform-aws-modules (2020-11)
Terraform Modules
Discussions related to https://github.com/terraform-aws-modules
Archive: https://archive.sweetops.com/terraform-aws-modules/
2020-11-02
oh @jamie implements a lot of his modules like ours - stylistically speaking
@davidvasandani were you using it?
I was thinking about it but wanted to know if CloudPosse had abandoned it or if there were any other reasons I shouldn’t use it.
It looks like exactly what I need right now
FYI its confusing that its CloudPosse branded but not in their org.
It was a candidate for inclusion at the time
In any case it’s not maintained, but the readme and examples work as described
If you want to use it, take a fork so you can adjust it.
It’s tf 0.11.14
It was the biggest module I ever made. It was very difficult at the time, with the limited documentation available. I ended up having to go through the tf aws provider source code to get the details I needed.
@jamie @davidvasandani happy to host it if either of you are interested in updating it
I’ll take a closer and look and weigh out updating this module vs creating our own.
It’s about 5 weeks of work and research in that module. So I hope you choose the path of forking it!
@davidvasandani also, if you’re on tf 0.11 anyway you should be able to just use the module as is.
@jamie we’re on 0.12.
See how far you get with running the version 0.12 converter on it, and updating the module versions it uses.
You should be able to test it by applying the example
Since the example sets up containers that use app mesh
If I remember correctly, the example is one I converted to tf from an amazon Cloudformation template that they used in their app mesh introduction blog
2020-11-03
anyone have successfully updated eks from 1.14 using terraform terragrunt? using terraform-root-modules
2020-11-04
2020-11-13
Hi Guys, does anyone know how to created a EKS node_group with permissions boundary from this module https://registry.terraform.io/modules/cloudposse/eks-node-group/aws/latest or include it to here like this
resource "aws_iam_role" "default" {
count = local.enabled ? 1 : 0
name = module.label.id
permissions_boundary = var.permissions_boundary
assume_role_policy = join("", data.aws_iam_policy_document.assume_role.*.json)
tags = module.label.tags
}
Terraform module to provision an EKS Node Group. Contribute to cloudposse/terraform-aws-eks-node-group development by creating an account on GitHub.
Hey Hashan, if you need a permissions boundary input for role that is created by that repo then feel free to fork and put up a PR. The only way to do that is to get it into the module.
Terraform module to provision an EKS Node Group. Contribute to cloudposse/terraform-aws-eks-node-group development by creating an account on GitHub.
Thanks @Matt Gowie will create a PR
what permissions_boundary policy for IAM Role created for EKS node group to restrict the IAM permissions on the account wide why IAM role can apply a permissions_boundary when there is a company-wi…
2020-11-16
2020-11-20
@Erik Osterman (Cloud Posse) I was using RDS module but found that it has only one (MySQL) example. So if I create MsSQL example, will that be accepted as contribution? As I could not found MSSQL example at example.
I have reviewed the contribution section. I will create PR but before that I wanted to confirm here.
Terraform module to provision AWS RDS instances. Contribute to cloudposse/terraform-aws-rds development by creating an account on GitHub.