#terraform-aws-modules (2022-11)
Terraform Modules
Discussions related to https://github.com/terraform-aws-modules
Archive: https://archive.sweetops.com/terraform-aws-modules/
2022-11-02
![Josh B. avatar](https://avatars.slack-edge.com/2022-05-23/3590168213712_fc95e4468b027cdca900_72.png)
Can we get eyes on this pr? https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/238
2022-11-06
![kris avatar](https://secure.gravatar.com/avatar/bb5eee16224c48a33a05735f899605b9.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0000-72.png)
I see 17 errors from Bridgecrew Infrastructure Security in this repo https://github.com/cloudposse/terraform-aws-dynamic-subnets. Is it something left unfixed (putting ignore/skip) intentionally to be fixed in the future?
Terraform module for public and private subnets provisioning in existing VPC
2022-11-09
![Paula avatar](https://avatars.slack-edge.com/2022-09-13/4070142320726_24f91e7b54e97b142967_72.jpg)
Hi! for one of these coincidences some of you used this module? https://registry.terraform.io/modules/marcosborges/loadtest-distribuited/aws/latest or can recomend me a good option for load testing?
![Joe Niland avatar](https://secure.gravatar.com/avatar/b90c8e752dd648ef229096c60ba2408f.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0022-72.png)
Cloud-scale load testing
![Joe Niland avatar](https://secure.gravatar.com/avatar/b90c8e752dd648ef229096c60ba2408f.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0022-72.png)
Not sure if this is still functional but it worked well in the past https://github.com/boostercloud/serverless-artillery
Combine serverless with artillery and you get serverless-artillery for instant, cheap, and easy performance testing at scale.
2022-11-14
![Tim Gourley avatar](https://avatars.slack-edge.com/2020-10-07/1407105576678_1011e3c9df3cb7ba0019_72.png)
Neptune users – for any users using terraform supported Neptune in production please be aware of issues of restoring clusters from snapshots. The issue is documented here – https://github.com/hashicorp/terraform-provider-aws/issues/23601 There is a PR with a fix (which we have tested this locally as well) – https://github.com/hashicorp/terraform-provider-aws/pull/25982 Please vote for the issue and the fix if this is a resource type you are using.
2022-11-17
![Quentin BERTRAND avatar](https://avatars.slack-edge.com/2022-08-29/4028696878592_774493d7ba3d4c45009e_72.jpg)
Hello,
I’m using terraform-aws-eks-node-group, I don’t understand if I can disable pet name
for node group. It is possible ?
2022-11-21
![Quentin BERTRAND avatar](https://avatars.slack-edge.com/2022-08-29/4028696878592_774493d7ba3d4c45009e_72.jpg)
Hi, It’s me, again, for another question ;
I’m using terraform-aws-eks-workers and terraform-aws-eks-cluster with Terragrunt, I’m stuck because I can’t use eks-workers ARN as input of the eks-cluster part, because eks-cluster is already a dependency of eks-workers
Do you think it could be a good idea to add kubernetes_config_map
resource in the terraform-aws-eks-workers module ? To add the workers role directly from this module to the cluster config map
![Quentin BERTRAND avatar](https://avatars.slack-edge.com/2022-08-29/4028696878592_774493d7ba3d4c45009e_72.jpg)
My bad, I just understood that the config map exists and can’t be modified so easily
![Quentin BERTRAND avatar](https://avatars.slack-edge.com/2022-08-29/4028696878592_774493d7ba3d4c45009e_72.jpg)
it works with kubernetes_config_map_v1_data
but maybe it is not a good thing to use it ?