#terraform-aws-modules (2021-06)
Terraform Modules
Discussions related to https://github.com/terraform-aws-modules
Archive: https://archive.sweetops.com/terraform-aws-modules/
2021-06-01
![Partha avatar](https://avatars.slack-edge.com/2022-08-15/3935474173206_9cc0036c15169efce65f_72.jpg)
Is there any way to take RDS snapshot by using AWS module ?
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
Maybe consider using our terraform-aws-backup module
2021-06-03
![Lukas de Boer avatar](https://secure.gravatar.com/avatar/cdcb7161c4115e53abc697332c5bc358.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0016-72.png)
Hi! I’ve filed a bugreport in your terraform-aws-alb-target-group-cloudwatch-sns-alarms
module No rush or anything, just wanted to let you know: https://github.com/cloudposse/terraform-aws-alb-target-group-cloudwatch-sns-alarms/issues/38
Describe the Bug This module exposes 4 different variables to set ARNs that the cloudwatch alarms will set as their actions: notify_arns alarm_actions ok_actions insufficient_data_actions The idea …
2021-06-08
![Ashish Sharma avatar](https://avatars.slack-edge.com/2021-06-07/2150461050004_e04e4661ea3a650388da_72.png)
Do we have any VPC module in github for outpost racks specific ?
2021-06-16
![Jacob avatar](https://secure.gravatar.com/avatar/9f1fbb3b947c95292a27b04ba9a25cb4.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0024-72.png)
Hi everyone. I’m trying to make a fully aws foundations and cis compliant environment. With some great help from the terraform modules.
All these modules define a s3 bucket policy and use internal the cloudposse/s3-log-storage/aws module which also defines the s3 bucket policy. cloudposse/config-storage/aws cloudposse/cloudtrail-s3-bucket/aws cloudposse/vpc-flow-logs-s3-bucket/aws
aws_s3_bucket_policy is a singleton function that can be called multiple times, but the last call overrride the policy.
![Jacob avatar](https://secure.gravatar.com/avatar/9f1fbb3b947c95292a27b04ba9a25cb4.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0024-72.png)
I filed one bug report here: https://github.com/cloudposse/terraform-aws-config-storage/issues/14
Found a bug? Maybe our Slack Community can help. Describe the Bug The s3 bucket policy conflicts with the bucket policy in the storage module. Every apply the policy is changed either one of the po…
![Erik Osterman (Cloud Posse) avatar](https://secure.gravatar.com/avatar/88c480d4f73b813904e00a5695a454cb.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0023-72.png)
@matt
Found a bug? Maybe our Slack Community can help. Describe the Bug The s3 bucket policy conflicts with the bucket policy in the storage module. Every apply the policy is changed either one of the po…
![Jacob avatar](https://secure.gravatar.com/avatar/9f1fbb3b947c95292a27b04ba9a25cb4.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0024-72.png)
I fixed it locally by moved the optional dynamic allow_ssl_requests_only piece in the bucket policy to the module instead of passing it to the s3 module.
It’s the same for these modules: cloudposse/vpc-flow-logs-s3-bucket/aws cloudposse/cloudtrail-s3-bucket/aws cloudposse/config-storage/aws
Later i’ll try to update bug repport