#terraform (2019-04)

terraform Discussions related to Terraform or Terraform Modules

Archive: https://archive.sweetops.com/terraform/

2019-04-01

ldlework avatar
ldlework

Today I tried the fixes that I thought were at the root of my CodePipeline/CodeBuild IAM issues, namely pulling out the ECR module so that it could be created before the pipeline was, but this didn’t actually solve the issue. Back at the same spot I was before.

ldlework avatar
ldlework

I’m really not sure why the IAM logic inside of the CloudPosse ecs-codepipeline module is failing for me now.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

what’s the error?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

this is a working example of using ECS with CodePipeline https://github.com/cloudposse/terraform-aws-ecs-atlantis

cloudposse/terraform-aws-ecs-atlantis

Terraform module for deploying Atlantis as an ECS Task - cloudposse/terraform-aws-ecs-atlantis

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” invocations for provisioning reference architectures - cloudposse/terraform-root-modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

i feel that you are missing the default backend app https://github.com/cloudposse/terraform-root-modules/blob/master/aws/ecs/default-backend.tf, that is created and deployed to the cluster before the CodePipeline starts building your app

cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” invocations for provisioning reference architectures - cloudposse/terraform-root-modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@ldlework ^

ldlework avatar
ldlework

I’m gonna think about all that

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) I’ve been going off this, https://github.com/cloudposse/terraform-aws-ecs-alb-service-task

cloudposse/terraform-aws-ecs-alb-service-task

Terraform module which implements an ECS service which exposes a web service via ALB. - cloudposse/terraform-aws-ecs-alb-service-task

ldlework avatar
ldlework

And since I need a version that is not exposed by the ALB I have tried to edit it a bit

ldlework avatar
ldlework

But now I am just trying to call it directly https://gist.github.com/dustinlacewell/a9cbe46d2ace7b71e2973ffb32531121 and Terraform is complaining:

* module.backend.module.service.aws_ecs_service.ignore_changes_task_definition: 1 error(s) occurred:
* aws_ecs_service.ignore_changes_task_definition: InvalidParameterException: Unable to assume role and validate the specified targetGroupArn. Please verify that the ECS service role being passed has the proper permissions.
ldlework avatar
ldlework

oh

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

remove what you feel you don’t need later

ldlework avatar
ldlework

I’m so screwed

ldlework avatar
ldlework

this is just not working

ldlework avatar
ldlework

I guess I should produce a minimal example

ldlework avatar
ldlework

What’s a cloudposse module that uses the ecs-codepipeline module?

ldlework avatar
ldlework

There’s one which uses the alb, ecr registry, container definition, the ecs task with alb, codepipeline, autoscaling, and cloudwatch in an example

ldlework avatar
ldlework

but I can’t find it now

ldlework avatar
ldlework

Race condition is not something I thought I would have to face down with Terraform

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

https://github.com/cloudposse/terraform-aws-ecs-web-app uses CodePipeline and ECR to deploy a web app to ECS

cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) Yeah that’s the one. I’ve basically tried to create a version of terraform-aws-ecs-web-app that does not expose the service via ALB and it has been a nightmare

ldlework avatar
ldlework

Basically the part that really need changing is the module that it uses, terraform-aws-ecs-alb-service-task which has the ALB target groups baked in

mmuehlberger avatar
mmuehlberger

terraform-aws-ecs-web-app is more or less an assembly module. It takes a bunch of other modules that do things, like terraform-aws-ecs-alb-service-task.

Best approach, imho, is to fork the module and change the bits that need changing (which can mean that you would need to fork terraform-aws-ecs-alb-service-task as well) and adapt it to your use case.

I ran into a similar issue yesterday as well, since I needed S3 instead of Github in the Codepipeline, for instance.

1
ldlework avatar
ldlework

I’ve done this but I still get the issue I’m having.

Vidhi Virmani avatar
Vidhi Virmani

Hello terraformers,

Vidhi Virmani avatar
Vidhi Virmani

I am using this eks module and recieving this error

Error: module.eks_cluster.aws_eks_cluster.this: vpc_config.0: invalid or unknown key: endpoint_private_access
Vidhi Virmani avatar
Vidhi Virmani
terraform-aws-modules/terraform-aws-vpc

Terraform module which creates VPC resources on AWS - terraform-aws-modules/terraform-aws-vpc

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

hi @Vidhi Virmani

Vidhi Virmani avatar
Vidhi Virmani

hi @Andriy Knysh (Cloud Posse)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

ask in #terraform-aws-modules since you are asking about terraform-aws-vpc from https://github.com/terraform-aws-modules

Terraform AWS modules

Collection of Terraform AWS modules supported by the community - Terraform AWS modules

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) I narrowed it down. Check this out https://gist.github.com/dustinlacewell/0b049b6c7e9699362bf9a4a14cb11469#file-main-tf-L43 When I use the official CloudPosse task module, it works - no race condition. However, when I use my own module I get the race condition with the IAM role and the CodePipeline not being able to execute the CodeBuild step. But my modules is literally a clone of the cloudposse module with no changes

ldlework avatar
ldlework

What the actual?!

ldlework avatar
ldlework

Simply changing the source = line there causes the issue or not. How is this possible?!

ldlework avatar
ldlework

Just as a reminder the error is:

Error calling startBuild: User: arn:aws:sts::607643753933:assumed-role/us-west-1-qa-backend-worker-codepipeline-assume/1554183144481 is not authorized to perform: codebuild:StartBuild on resource: arn:aws:codebuild:us-west-1:607643753933:project/us-west-1-qa-backend-worker-build (Service: AWSCodeBuild; Status Code: 400; Error Code: AccessDeniedException;
ldlework avatar
ldlework

If I simply rerun the CodePipeline it runs successfully because the race condition is over.

ldlework avatar
ldlework

The gist is basically the aws-ecs-web-app code with very little changes at all.

ldlework avatar
ldlework

Minus the webscaling, and alerts

ldlework avatar
ldlework

oh god what if the autoscaling and alerts somehow affect the dependency ordering

ldlework avatar
ldlework

I mean, both the autoscaling and alerts refer to the ecs-alb-task’s service_name field the same way the codepipeline module does

mmuehlberger avatar
mmuehlberger

The pipeline error should have nothing to do with the ECS related parts of the module.

ldlework avatar
ldlework

I’ve wasted so many days on this lol

mmuehlberger avatar
mmuehlberger

I used the module as is, just disabling the codepipeline part with the parameter and built codepipeline outside and still got the error.

ldlework avatar
ldlework

When I use all the modules using git references, it all works.

ldlework avatar
ldlework

When I clone the ecs-alb-task locally, and refer to it instead, I get the race condition

ldlework avatar
ldlework

Always in the build step of the codepipeline, same error

mmuehlberger avatar
mmuehlberger

Since it only occurred when first setting up the pipeline, I didn’t bother investigating, so unfortunately I don’t have a fix for you, ready.

ldlework avatar
ldlework

Yeah it only occurs when setting up the pipeline, if you manually rerun it, it works.

mmuehlberger avatar
mmuehlberger

It also works, when triggering the pipeline automatically from the source step.

ldlework avatar
ldlework

Yeah

ldlework avatar
ldlework

manual github webhook trigger or whatever

ldlework avatar
ldlework

I’m pretty sure it is some kind of IAM race condition

ldlework avatar
ldlework

Like Terraform is not deciding on the same dependency graph when those two lines in my gist are changed.

mmuehlberger avatar
mmuehlberger

If I got time later today, I might have a look at it.

ldlework avatar
ldlework

@mmuehlberger My personal goal is to just use what’s in the aws-ecs-web-app but without the ALB. I have containers that run just like my web containers but are queue workers that shouldn’t be exposed via ALB.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

The whole point of the aws-ecs-web-app module is that it’s a “web app” and an opinonated implementation of how that webapp should work.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

if you look at the module, however, you’ll see it’s composed by a handful of other modules

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

which is why it’s so easy to decompose and create your own opinionated version of what a web app should look like

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

our approach is not to make an individual module overly configurable, but instead make modules very composable.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

/me i think that’s what you were saying

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

so you can ignore me. i jumped in the thread too late.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

ldlework avatar
ldlework

Heh I was gonna say “That’s what I’m doing!”

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yea… sorry!

ldlework avatar
ldlework

I thought this would be so easy

ldlework avatar
ldlework

mmuehlberger avatar
mmuehlberger

It always looks that way and it never is.

ldlework avatar
ldlework

do you think comparing the output between the two terraform runs might be useful?

mmuehlberger avatar
mmuehlberger

I’d check where the permission is set and if there’s an explicit dependency missing. My best guess right now would be, that the policy is not set yet and codepipeline doesn’t wait for it. a depends_on would do the trick.

ldlework avatar
ldlework

yeah just no idea on what

ldlework avatar
ldlework

something in the task?

ldlework avatar
ldlework

something inside the codepipeline module itself? (if so why does changing the task module screw everything up?)

mmuehlberger avatar
mmuehlberger

I think that has to do with how Terraform unwraps the dependency graph internally. As I mentioned, I get the exact same issue, but with different changes.

ldlework avatar
ldlework

@mmuehlberger oh neat terraform has a graph command

ldlework avatar
ldlework
ldlework avatar
ldlework

lol

mmuehlberger avatar
mmuehlberger

I didn’t want to recommend it, because it does this with complex modules.

ldlework avatar
ldlework

mother of god

ldlework avatar
ldlework

So you’re pretty confident that it is not actually in the task module, but some non-determinism in the ecs-codepipeline module?

mmuehlberger avatar
mmuehlberger

Yes, as the pipeline doesn’t touch ECS until the deploy step and everything is separated.

ldlework avatar
ldlework

I noticed that the IAM roles use policy attachments.

ldlework avatar
ldlework

Could it be that the codepipeline properly depends on the IAM role but not the attachment?

ldlework avatar
ldlework

And so the role gets created before the pipeline, but not the attachment, which Terraform schedules afterwards?

mmuehlberger avatar
mmuehlberger

Yes, that was my thought (without looking at the code).

ldlework avatar
ldlework

Maybe simply adding a depends_on from the pipeline to all the policy attachments, it might work reliably.

ldlework avatar
ldlework

2 am here though I’ll have to try in the morning.

loren avatar

I feel like I just ran into this race condition with policy attachments recently… Different resources and use case for me, but this is ringing a bell… Sometimes terraform’s parallelism gets the better of it :/

loren avatar

ahh, found it… a race condition with an instance profile… had the dependency on the role name rather than the profile name, but ec2 requires the profile to exist before trying to assign the instance profile…

while fixing that, discovered that the profile had no dependency on the policy attachment, so sometimes the instance would start spinning up and not yet have the necessary permissions

ldlework avatar
ldlework

@loren do you think you could look at the ecs-codepipeline module to see if you see anything obvious that’s of similar form?

loren avatar

which specific module? (link) i’ve not used any of the ecs stuff, and seems like there’s quite a few repos

ldlework avatar
ldlework
cloudposse/terraform-aws-ecs-codepipeline

Terraform Module for CI/CD with AWS Code Pipeline and Code Build for ECS https://cloudposse.com/ - cloudposse/terraform-aws-ecs-codepipeline

ldlework avatar
ldlework

There is some kind of race condition that causes the CodeBuild step of the CodePipeline to fail due to IAM permission failure.

ldlework avatar
ldlework

I can get the exact error if that helps.

loren avatar

the only place i see aws_iam_role.default referenced is in the aws_codepipeline.source_build_deploy resource

loren avatar

so i’d say, yeah, if the error is in the pipeline, then try adding a depends block for the attachment to the pipeline resource

ldlework avatar
ldlework

@loren Should I do it for each attachment?

ldlework avatar
ldlework

As a matter of best-practice?

loren avatar

in this case i would list all attachments in the depends block, not sure i’d go so far as best practice yet

ldlework avatar
ldlework

hahaha

ldlework avatar
ldlework

like something is ordered differently maybe

2019-04-02

mmuehlberger avatar
mmuehlberger

I think terraform got dumber. I got the error now a couple of times, but it should clearly be able to figure out the length of a static list module.chamber_database.aws_ssm_parameter.default: aws_ssm_parameter.default: value of 'count' cannot be computed.

mmuehlberger avatar
mmuehlberger

Even this fails:

resource "aws_ssm_parameter" "default" {
  count           = "${length(local.parameter_write)}"
  name            = "${lookup(local.parameter_write[count.index], "name")}"
  description     = "${lookup(local.parameter_write[count.index], "description", lookup(local.parameter_write[count.index], "name"))}"
  type            = "${lookup(local.parameter_write[count.index], "type", "SecureString")}"
  key_id          = "${lookup(local.parameter_write[count.index], "type", "SecureString") == "SecureString" ? data.aws_kms_key.chamber.arn : ""}"
  value           = "${lookup(local.parameter_write[count.index], "value")}"
  overwrite       = "${lookup(local.parameter_write[count.index], "overwrite", "false")}"
  allowed_pattern = "${lookup(local.parameter_write[count.index], "allowed_pattern", "")}"
  tags            = "${var.tags}"
}
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yup

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

we threw in the towel on using an SSM module for writing to SSM

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

it just doesn’t work for anything but constant values

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

basically, writing things from .tfvars to SSM

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

writing things from any other module to SSM using a module :thumbsdown: (due to count of problems)

mmuehlberger avatar
mmuehlberger

I get, when it can’t figure it out from dynamic values from another module and complex conditionals, but without a module, just a local list of params and the resource? How basic do I need to get?

mmuehlberger avatar
mmuehlberger

At least it’s not that more repetitive to write them as one resource each.

Vucomir Ianculov avatar
Vucomir Ianculov

Hi, i provision a EKS cluster with terraform-aws-eks-cluster/examples/complete everything work but i see that my worked nods have multiple private ip assign to them, is this normal?

Pablo Costa avatar
Pablo Costa

Yes Vucomir, It is normal. AWS do the trick of assigning secondary IP addresses to Interfaces (ENI) in order to provide native VPC IPs to pods

Vucomir Ianculov avatar
Vucomir Ianculov

so i got 10 secondary private ip’s on one mode

Vucomir Ianculov avatar
Vucomir Ianculov

and 2 private ip’s

Vucomir Ianculov avatar
Vucomir Ianculov

but i did not deploy anything in the cluster

Tim Malone avatar
Tim Malone

AWS will have already deployed things like coredns, aws-node, etc. for you - so there’ll be some pods running already

Pablo Costa avatar
Pablo Costa

According to the ec2 type, the aws eks reserves secondary IPs in advance

Vucomir Ianculov avatar
Vucomir Ianculov

Thanks!

Vucomir Ianculov avatar
Vucomir Ianculov

if i go with node ports in that case i would not need VPC ip,

Vucomir Ianculov avatar
Vucomir Ianculov

sorry for all this question i just start with Kubernetes

Pablo Costa avatar
Pablo Costa

This article discusses the trade-offs of aws eks networking https://www.weave.works/blog/aws-and-kubernetes-networking-options-and-trade-offs-part-3

AWS and Kubernetes Networking Options and Trade-offs - Part 3attachment image

In this instalment of Kubernetes networking on AWS, Mark Ramm, goes through the pros, cons and tradeoffs between VPC native networking vs implementing the VPC CNI plugin.

Vucomir Ianculov avatar
Vucomir Ianculov

Thanks @Pablo Costa, will check it

Pablo Costa avatar
Pablo Costa

You are welcome !!

ldlework avatar
ldlework

@loren @Erik Osterman (Cloud Posse) @Andriy Knysh (Cloud Posse)

loren avatar

Is that better or worse than before?

ldlework avatar
ldlework

It would fail instantly before.

ldlework avatar
ldlework

Looks like it’s going to complete successfully. Thanks so much to all three of you again.

cool-doge1
ldlework avatar
ldlework

I almost wept.

2
ldlework avatar
ldlework

lol

loren avatar

I kind of hate role attachments, but there isn’t yet a better option

loren avatar

Trying hard to get this pr merged, which would handle the attachment right in the role resource,https://github.com/terraform-providers/terraform-provider-aws/pull/5904

resource/aws_iam_role: Add exclusive list support for a role's inline and managed policies by YakDriver · Pull Request #5904 · terraform-providers/terraform-provider-aws

Fixes part of #4426 Changes proposed in this pull request: resource/aws_iam_role: Add inline_policy and managed_policy_arns arguments to aws_iam_role to configure role policies and fix out-of-band…

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

nice @ldlework

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

so FYI, if you have similar issues and you think it’s a race condition, the fastest way to test it without modifying a bunch of modules is to use --target to provision some resources first

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) @Erik Osterman (Cloud Posse) should I submit a PR?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

please submit

ldlework avatar
ldlework

ok

ldlework avatar
ldlework
Codepipeline depends_on each policy attachment to avoid races by dustinlacewell · Pull Request #21 · cloudposse/terraform-aws-ecs-codepipeline

This adds a depends_on clause to the aws_codepipeline resource pointing to each aws_iam_role_policy_attachment. This avoids a race condition where the policy attachments are not yet available when …

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

released 0.6.1

johncblandii avatar
johncblandii

I was going to submit a talk, but it seems it would boil down to “Use Cloudposse modules” for the most part.

https://hashiconf.hashicorp.com/#submit-a-talk

HashiConf 2019 by HashiCorpattachment image

HashiConf 2019 by HashiCorp

fast_parrot3
ldlework avatar
ldlework

It’s still happening…

ldlework avatar
ldlework
09:28:11 PM

sighs

ldlework avatar
ldlework

how is that even possible

ldlework avatar
ldlework

Here’s a cleaned up terraform log showing the order in which it did things: https://gist.github.com/dustinlacewell/1c5bfad4b91c3ced519727045588e74d

ldlework avatar
ldlework

It looks like it created all of the policy stuff before the codepipeline

ldlework avatar
ldlework

ARGH!!!!

ldlework avatar
ldlework

wtf is going onnnn

ldlework avatar
ldlework

Could the same problem be plaguing the codebuild module?

ldlework avatar
ldlework

I added the depends_on to even the codebuild project inside the codebuild module linking to the policy attachments that it uses

ldlework avatar
ldlework

And I still get the error

ldlework avatar
ldlework

I’m starting to think Terraform is garbage…

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

It’s solving a realllllllllly hard problem in a generic way

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

the frustrating thing for me is that the workarounds often mean rearchitecting the terraform modules (combining them and not composing them) and that’s a non-starter

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

this is why I think the analogies to CSS are so good. you can do it all in CSS, but you end up have a TON of workarounds.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

perhaps the problem is that we’re even trying to use HCL as a “programming language” rather than a “configuration”

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

and hashicorp should instead produce a tool like SASS to generate configurations.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

(but I dn’t see that happening!)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

So maybe it’s what it says, the assumed role user does not have permissions

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Did you go to the AWS console and start the build manually?

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) If I click the “Release Change” and start the pipeline manually it works fine.

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) look at this gist which is a cleaned up log of the terraform application: https://gist.github.com/dustinlacewell/0162c8f06273fdefe5c534c3e5267fae

ldlework avatar
ldlework

Lines prefixed with @@ show the policy attachment lines

ldlework avatar
ldlework

Lines prefixed with !! show the pipeline and codebuild creation lines

ldlework avatar
ldlework

It looks like everything is created in the right order?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Under which user do you login to the console manually and start the build?

ldlework avatar
ldlework

My own user

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It could have different permissions

ldlework avatar
ldlework

I have used the policy tester though in the past

loren avatar

i know i’ve seen race conditions in things like s3 bucket policies, where i modify the bucket policy but then it takes a few seconds before it is effective (based on cli tests)

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) if I kick off the build via telling github to send the webhook that should be a real test right?

ldlework avatar
ldlework

Is there any kind of waiter hacks I can do?

loren avatar

sleep in local exec

ldlework avatar
ldlework

Like, run this waiter locally until the policy works for the thing

ldlework avatar
ldlework

what a tire fire

ldlework avatar
ldlework

I wonder if Terraform has a default parallelism I can turn off

loren avatar

yes

loren avatar

-parallelism=1

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

You can also switch the role in the console and test it manually under the real user

ldlework avatar
ldlework

Shouldn’t we be able to deduce precisely which part of the terraform is responsible for this?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

If it’s a permissions issue, it’s not terraform responsibility. You can give broader permissions to the created role and apply again

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Give it admin permissions to test

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) What I meant is, the HCL responsible for setting up this permission, like identifying the bit that is supposed to give the right permission to the right role.

ldlework avatar
ldlework

I’m not sure what IAM role or policy document etc is responsible for this particular failure…

ldlework avatar
ldlework

And if I give it admin, will that even matter since it seems to be a race condition? It wont have admin in time.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

That’s how you test if it’s a race condition or permissions issue

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) do you know which policy is the right one?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Give all four policies an admin permission and test

loren avatar

Also try running the pipeline from the cli, in debug mode. Might capture the permission failure better

ldlework avatar
ldlework

like this ?

  statement {
    sid = ""
    actions = ["*"]
    resources = ["*"]
    effect    = "Allow"
  }
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Yes try it

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) do I need to add the principal or will omitting it allow any service to assume it or whatever

ldlework avatar
ldlework
  • aws_iam_role.default: Error creating IAM Role us-west-1-qa-backend-codepipeline-assume: MalformedPolicyDocument: Has prohibited field Resource
ldlework avatar
ldlework
data "aws_iam_policy_document" "assume" {
  statement {
    sid = ""
    actions = ["*"]
    resources = ["*"]
    effect    = "Allow"
  }
}
ldlework avatar
ldlework

i’m going crazy lol

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Specify resources

ldlework avatar
ldlework

huh, it’s building on the first time

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It should. We used those modules about 125 times and never saw the issues with race conditions (not saying they can’t be introduced by TF or AWS)

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) I suspect that it has something to do with how I’m wrapping your modules in my own modules. Like for my codepipeline, I call ecs-codepipeline and the cloudposse module for ECR as an example

ldlework avatar
ldlework

And I had to fork the ecs task module so I can remove the ALB

ldlework avatar
ldlework

Actually, I have zero idea

ldlework avatar
ldlework

Because why would making the role an admin work

ldlework avatar
ldlework

it makes one want to crawl under their desk and dissapear

ldlework avatar
ldlework

Can I ask some general IAM questions about the ecs-codepipeline module? Is it creating one IAM role but attaching multiple policies? Like is one policy, the sts:AssumeRole policy, the policy that lets the CodeBuild service assume the role we’re creating?

ldlework avatar
ldlework

and then the other policy documents that are attached describe what that user can do?

ldlework avatar
ldlework

freaking magnets

ldlework avatar
ldlework

how do they work?!

ldlework avatar
ldlework

OK so I narrowed it down

ldlework avatar
ldlework
data "aws_iam_policy_document" "codebuild" {
  statement {
    sid = ""

    actions = [
      "codebuild:*",
    ]

    resources = ["${module.build.project_id}"]
    effect    = "Allow"
  }
}
ldlework avatar
ldlework

Changing the resources there to be "*" fixes the issue apparently.

ldlework avatar
ldlework

Thoughts?

loren avatar

Is that project_id actually the arn? codebuild:StartBuild requires the arn…

loren avatar

arn:aws:codebuild:region-ID:account-ID:project/project-name

loren avatar
CodeBuild Permissions Reference - AWS CodeBuild

Describes the AWS CodeBuild API operations and the corresponding actions you grant permissions to perform.

ldlework avatar
ldlework
cloudposse/terraform-aws-ecs-codepipeline

Terraform Module for CI/CD with AWS Code Pipeline and Code Build for ECS https://cloudposse.com/ - cloudposse/terraform-aws-ecs-codepipeline

ldlework avatar
ldlework
output "project_id" {
  description = "Project ID"
  value       = "${join("", aws_codebuild_project.default.*.id)}"
}
ldlework avatar
ldlework

It does seem to be the ARN…

ldlework avatar
ldlework

There’s never any answers!!!

ldlework avatar
ldlework

lol

ldlework avatar
ldlework

I’ve redeployed a few times. It’s definitely the “*” for resources on that one policy.

loren avatar

Maybe look in the account and double-check that is the actual arn of the project, and that the policy lists that same arn

ldlework avatar
ldlework

ok

ldlework avatar
ldlework

OK I redeployed with the original code, and it failed as expected:

ldlework avatar
ldlework

And here is the role, and attached policy with resource shown:

ldlework avatar
ldlework

Thoughts?

ldlework avatar
ldlework

The ARN in the error message, and the ARN listed in the policy are the same.

ldlework avatar
ldlework
arn:aws:codebuild:us-west-1:607643753933:project/us-west-1-qa-backend-build
ldlework avatar
ldlework
arn:aws:codebuild:us-west-1:607643753933:project/us-west-1-qa-backend-build
loren avatar

This looks like an aws thing, not so much a terraform thing….

loren avatar

There’s some permission getting used under the covers and the error message is obscuring the real error

loren avatar

Still recommend trying to run the pipeline from the cli, using a credential for that same role

ldlework avatar
ldlework

Could it have anything to do with:

loren avatar

It’s really hard to create a restrictive IAM policy that doesn’t result in that message. I generally consider it a red herring

ldlework avatar
ldlework

I see.

loren avatar

But, if you look at the codebuild IAM link I shared above, you’ll see that some actions do not support resource restrictions… So for those actions, the codebuild:* permission isn’t applying, because the resource attribute is not *

loren avatar

Delete, import, and some “list” actions, in particular

loren avatar

If the pipeline is, under covers, trying one of those actions, maybe list something or other, then it won’t have permission

loren avatar

Which would explain why it works when you change the resource to *

ldlework avatar
ldlework

But not why this works for everyone else who uses the CloudPosse module as-is

loren avatar
loren
11:40:11 PM

¯_(ツ)_/¯

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

What’s the output of this?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
output "project_id" {
  description = "Project ID"
  value       = "${join("", aws_codebuild_project.default.*.id)}"
}
ldlework avatar
ldlework

I just destroyed and am re-rolling so I’ll let you know if a bit

ldlework avatar
ldlework

ldlework avatar
ldlework
us-west-1-qa-backend-build
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It actually looks like not a permissions issue :) and definitely not a race condition.

ldlework avatar
ldlework
project_id = arn:aws:codebuild:us-west-1:607643753933:project/us-west-1-qa-backend-build
project_name = us-west-1-qa-backend-build
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It just looks like wrong name

ldlework avatar
ldlework

I’m not crazy!!!!

ldlework avatar
ldlework
11:50:49 PM

rejoyces.

ldlework avatar
ldlework

Want a PR?

ldlework avatar
ldlework

I’ll test first actually.

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) because how does the policy end up with the right ARN as the resource?

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) ecs-codepipeline does use the project_id

ldlework avatar
ldlework

So I think it’s correct…

foqal avatar
foqal
11:54:01 PM

Helpful question stored to <@Foqal> by @loren:

I suspect that it has something to do with how I'm wrapping your modules in my own modules. Like for my codepipeline, I call ecs-codepipeline and the cloudposse module for ECR as an example...
ldlework avatar
ldlework

I’m hedging on @loren’s explanation

loren avatar

You can extend the policy document to include a second statement for codebuild:List* with a resource of *

loren avatar

If that works reliably, good to go, got a viable min permissions policy

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Are you using one AWS account or many? That assume role is in the same account?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Because it has nothing to do with the permissions. When you changed the ARN of the build project (by using * but still) it worked

ldlework avatar
ldlework

Just one account.

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) but I showed with screenshots before that the ARN that ends up in the policy is the same one mentioned in the error

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

But of course it should be the same, otherwise you would not see the error :)

ldlework avatar
ldlework

huh?

ldlework avatar
ldlework

The policy gives codebuild access to the ARN of the project that shows up in the error complaining the policy doesen’t give it access

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

The error message was generated from the provisioned resources

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

That’s why the ARNs are the same

ldlework avatar
ldlework

But isn’t the ARNs being the same what gives the service permission to do stuff to that resource?

ldlework avatar
ldlework

I feel like I’m missing something big here

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Are you using CP label module to name ALL the resources?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Check if namespace, stage and name are the same for all modules you are using

ldlework avatar
ldlework

@Andriy Knysh (Cloud Posse) I haven’t changed any of the naming inside of the ecs-codepipeline module. I pass in a namespace, stage, and name to ecs-codepipeline but don’t change how it uses it.

ldlework avatar
ldlework

Are you saying this needs to be the same across ALL resources across all CloudPosse modules in use?

ldlework avatar
ldlework

Like when I call the container definition, the ecs-alb-task, etc?

ldlework avatar
ldlework

(I don’t want to maintain a fork of ecs-codepipeline and so haven’t made any changes except the depends_on changes which were merged, and changing the resource to "*".

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

I just asked if you used the same namespace, stage and name for all resources and modules that you used in that particular project

ldlework avatar
ldlework

No like, when I call a module, I pass in the aws_region as the namespace, the stage name as the stage, and the module name as the name

ldlework avatar
ldlework

like I pass in “codepipeline” as the “name” to codepipeline module

ldlework avatar
ldlework

I’ll try unifying everything

ldlework avatar
ldlework

As far as I can see everything is already unified. I was wrong about changing the name parameter. I pass the top-level var.name all the way down. So everything is getting “backend” as the var.name

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Share your complete code, we’ll take a look. Maybe something changed in TF or AWS, or maybe it’s a user/permissions issue (not the permissions from the module, but rather how it’s used)

ldlework avatar
ldlework

Let me know if you want me to add something else

ldlework avatar
ldlework

qa/main.tf calls fargate-alb-task/main.tf calls my ecs-codepipeline/main.tf calls CloudPosse ecs-codepipeline

ldlework avatar
ldlework

It is basically the ecs-alb-web-app module, with each layer, vpc, aurora, elasticache, alb, ecs, and each of the ecs services implemented as a layer module

ldlework avatar
ldlework

each layer module usually calls out to CloudPosse modules - like my ecs-codepipeline module calls both the CloudPosse ECR and CodePipeline modules

ldlework avatar
ldlework

stage -> layer -> component -> cloudposse/resources

ldlework avatar
ldlework

so the qa stage has a layer called “backend” which is an invocation of the “fargate-alb-service”, which calls a number of my own component modules like “container” “ecs-alb-service” and “codepipeline”. My component modules usually compose a few cloudposse modules and resources.

ldlework avatar
ldlework

I should rename my codepipeline module to something like cicd or pipeline

ldlework avatar
ldlework

I guess one thing I wonder is whether you guys would accept a patch that allowed you to override the resource value?

ldlework avatar
ldlework

This would allow me to move on without having to fork codepipeline for that

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

So we’ll take a look a little bit later

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

The problem with using * for resources is a security hole

loren avatar

for the record, here’s what i was trying to get at (while only on my phone last night)…

data "aws_iam_policy_document" "codebuild" {
  statement {
    sid = ""

    actions = [
      "codebuild:*",
    ]

    resources = ["${module.build.project_id}"]
    effect    = "Allow"
  }

  statement {
    sid = ""

    actions = [
      "codebuild:List*",
    ]

    resources = "*"
    effect    = "Allow"
  }
}
loren avatar

so basically the same, “write” actions still restricted to the project, but the “list” actions would now work

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

If the issue is just the missing list action, then yes. It needs to be tested

loren avatar

certainly

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It gives permissions for all codebuild resources

ldlework avatar
ldlework

Yeah I understand. No one would have to use that option to override the resource as “*” though.

ldlework avatar
ldlework
cloudposse/terraform-aws-ecs-codepipeline

Terraform Module for CI/CD with AWS Code Pipeline and Code Build for ECS https://cloudposse.com/ - cloudposse/terraform-aws-ecs-codepipeline

2019-04-03

Juan Cruz Diaz avatar
Juan Cruz Diaz

Hello there! Where i can find some references to cloudflare terraform modules

tallu avatar

how can I convert

> replace(replace(replace(replace("m1.xlarge,c4.xlarge,c3.xlarge,c5.xlarge,t2.xlarge,r3.xlarge","/^/","{ \"InstanceType\" :\""),"/,/","\"},"),"/$/","\"}"),"/,/",",{\"InstanceType\": \"")
{ "InstanceType" :"m1.xlarge"},{"InstanceType": "c4.xlarge"},{"InstanceType": "c3.xlarge"},{"InstanceType": "c5.xlarge"},{"InstanceType": "t2.xlarge"},{"InstanceType": "r3.xlarge"}

into

[{ "InstanceType" :"m1.xlarge"},{"InstanceType": "c4.xlarge"},{"InstanceType": "c3.xlarge"},{"InstanceType": "c5.xlarge"},{"InstanceType": "t2.xlarge"},{"InstanceType": "r3.xlarge"}]

and still be able to use it in Cloudformation looks like the } is the issue with the CF template

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@tallu you want to convert the string to a list, or just replace the chars?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I’m going to hang out in this zoom for a little bit in case anyone has any questions.

tallu avatar

I want to convert string or maybe list "m1.xlarge,c4.xlarge,c3.xlarge,c5.xlarge,t2.xlarge,r3.xlarge" to json

[{ "InstanceType" :"m1.xlarge"},{"InstanceType": "c4.xlarge"},{"InstanceType": "c3.xlarge"},{"InstanceType": "c5.xlarge"},{"InstanceType": "t2.xlarge"},{"InstanceType": "r3.xlarge"}]
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

that’s quite easy. use smething like this

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

format("[%s]", join(",", formatlist("{\"InstanceType\": \"%s\"}", split(var.list)))

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

i haven’t tested that and might have bungled something small

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

but if you look at the interpolations for terraform, you’ll see where i’m coming from

tallu avatar

thanks let me give it a shot

tallu avatar

~the output seems to be working but something in that is making Cloudformation fail~evermind it seems something else

ldlework avatar
ldlework

Does anyone have any information on how to establish a registered domain name (say on GoDaddy) with AWS via Terraform?

ldlework avatar
ldlework

I’ve never done Route53 anything before.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-route53-cluster-zone

Terraform module to easily define consistent cluster domains on Route53 (e.g. [prod.ourcompany.com](http://prod.ourcompany.com)) - cloudposse/terraform-aws-route53-cluster-zone

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@ldlework that module is used to create a zone with delegation

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-route53-cluster-zone

Terraform module to easily define consistent cluster domains on Route53 (e.g. [prod.ourcompany.com](http://prod.ourcompany.com)) - cloudposse/terraform-aws-route53-cluster-zone

ldlework avatar
ldlework

What about the second-level-domain, like “example.com” how do I initially set that up with Route53? Or can I do that with the cluster-zone module?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

then get the name servers from the output and update NS records in GoDaddy

ldlework avatar
ldlework

What if I want to use AWS for the DNS?

ldlework avatar
ldlework

Like I’m trying to migrate a domain from GoDaddy to completely managed by AWS with Terraform as much as possible.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

the root name servers are where you buy the domain itself

ldlework avatar
ldlework

it can be transfered right?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

so if you buy it on GoDaddy, you can’t use the root NS on AWS

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

if you buy the domain in Route53, then yes

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

transfer too

ldlework avatar
ldlework

OK, so that step has to be manual. But once the domain is “owned” by AWS, then I can create zones and stuff with Terraform.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yes

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-route53-cluster-hostname

Terraform module to define a consistent AWS Route53 hostname - cloudposse/terraform-aws-route53-cluster-hostname

Tim Malone avatar
Tim Malone

Not sure if this is what was being asked, but, 2 things:

  • you can manage the DNS in a different place to where you buy the domain, if you want
  • Terraform can’t manage Route53 domain registrations/management; just the DNS side of things
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you can create zones and records with TF even if you have not transferred the domain yet

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it just will not be visible on the internet

maarten avatar
maarten

I don’t know about GoDaddy, but many Registrars let you use different Nameservers including Route53.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

(if you buy the domain on GoDaddy, you have to update the name servers there to point to the AWS NS)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

(unless you transfer it to Route53)

ldlework avatar
ldlework

OK so it seems like just having the domain’s DNS point to route53 for now is fine and I’ll be able to build out the infrastructure just fine with that setup

ldlework avatar
ldlework

thank you

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yes, create the zone, get its name servers, update them in GoDaddy, then you can create records in the Route53 zone

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

also, you will be able to request SSL certs with domain validation only after you update the NS records in GoDaddy

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

(in other words, ROOT NS records can be updated in the DNS system only by the entity that sold you the domain, or you transfer it to)

ldlework avatar
ldlework

We have a single AWS account, and I’m going to be running QA in us-west-1 and Prod in us-east-1 (for the foreseeable future) does it make sense to have some Terraform that is not part of our “environment deployments” that sets up the zone for the dns in a “global-y” way sort of how I’m doing for the initial terraform state?

maarten avatar
maarten

@ldlework If you still need to setup QA, I would personally opt for a new account and sticking to the same region.

ldlework avatar
ldlework

I asked and was denied.

maarten avatar
maarten

Ugh, why, can I ask ?

ldlework avatar
ldlework

We’re a poor startup, far behind schedule, lead by a young inexperienced slightly petulant guy who makes random decisions that can’t be rationally accounted for.

maarten avatar
maarten

Having seperate accounts is actually part of the AWS Well architected framework

ldlework avatar
ldlework

Trust me, its not even close to the most mind-bending thing I have to deal with.

ldlework avatar
ldlework

I agree, I’m fully on board.

maarten avatar
maarten

and does not cost more, actually less if you have support on one account and no support on the qa account ( not sure if this still is the case)

maarten avatar
maarten

good luck with that anyway, what i do in certain situations is to give prod and dev their own hosted zone

loren avatar

you get a hosted zone, and you get a hosted zone, and you get a hosted zone…

maarten avatar
maarten

haha

maarten avatar
maarten

here you go

loren avatar

yaaaaas

ldlework avatar
ldlework

The point is you don’t have to convince me, I’m already convinced. I gave many more reasons too.

ldlework avatar
ldlework

I see.

maarten avatar
maarten

dev.domain.com prod.domain.com or more obfusicated, and have terraform setups to maintain those hosted zones

ldlework avatar
ldlework

what about “domain.com

maarten avatar
maarten

clearly for domain.com and www.domain.com you would need to create an alias to the existing record in prod.domain.com

ldlework avatar
ldlework

so I can’t use “domain.com” instead of “prod.domain.com” ?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you can do this (fewer reasons to convince the boss :

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
  1. [domain.com](http://domain.com) is the vanity domain, the brand (the business owns it)
maarten avatar
maarten

@ldlework you can , you can have multiple zones in your route53

maarten avatar
maarten

one for domain.com ( with IN NS records delegating sub domains to different authorative nameservers AKA the other hosted zones you are going to make )

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
  1. You buy [domain.io](http://domain.io) in Route53 and use it for all service discovery
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
  1. Create [prod.domain.io](http://prod.domain.io), [staging.domain.io](http://staging.domain.io), [dev.domain.io](http://dev.domain.io) subdomains for your environments
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
  1. Then in [domain.com](http://domain.com) zone, add CNAME to [prod.domain.io](http://prod.domain.io) (this could even be on GoDaddy if the business does not want to move or update it)
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

^ you separate the business-related stuff from the infra stuff

ldlework avatar
ldlework

It makes a lot of sense.

ldlework avatar
ldlework

So for a given domain, I have to extract the nameservers from something in Route53 and add them to GoDaddy. Do I extract the nameservers from the zone’s that are created with Terraform? Do I have to do this for each zone or just one?

ldlework avatar
ldlework

(You can tell how I’ve never done any of this before)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

just for one “root” zone (domain.com)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

get its name servers and update in GoDaddy

ldlework avatar
ldlework

You don’t think I should manage this indepdendently from environments?

ldlework avatar
ldlework

Well you do, you said get two domains, but I only have one for now.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you have two cases here: 1) update the vanity domain NS in GoDaddy and then create all subdomains in the same Route53 zone

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

2) do service discovery domain and subdomains, and then add CNAME to the vanity domain

ldlework avatar
ldlework

Can’t I add one root zone with some side-Terraform for “domain.com”, get the NS from it, add those to GoDaddy. Then in my deployments create a per-deployment zone for “prod.domain.com” “dev.domain.com” etc, which point to that environment’s resources, using remote data resource to get a referencce to the root zone id or whatever? Then I could have some kind of CNAME in the root zone pointing at the “prod.domain.com” record in the prod-specific zone?

ldlework avatar
ldlework

So that “domain.com” resolves to “prod.domain.com”?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

that’s what we do

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it could be in one AWS account, or in multiple (in which case we do DNS zone delegation, which is to say we add NS records from [prod.domain.io](http://prod.domain.io) to the root zone [domain.io](http://domain.io) NS )

ldlework avatar
ldlework

OK cool, so first step, write some side-terraform to setup the root zone for “domain.com” and get that configured with GoDaddy. Then I can update my deployment HCL, to get a reference to the root zone, to add a deployment specific zone on a subdomain. I guess I’ll have to hand-add the record pointing from “domain.com” to “prod.domain.com” or something.

ldlework avatar
ldlework

Since it seems like a circular reference kinda.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

if you with CNAME, those should be diff domains

ldlework avatar
ldlework

OK so I’ll need some other kind of record in the root zone then?

ldlework avatar
ldlework

Or are you saying with a single domain, I should only have one zone, but each deployment adds records to it?

ldlework avatar
ldlework

argh, I should probably just start and a lot will be clearer on the way maybe

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

see the use-cases above ^

ldlework avatar
ldlework

OK

maarten avatar
maarten

( one side note, for the apex record, not www. , just domain.com CNAME’s don’t exist, but aws has ALIAS A records which achieve the same thing )

1
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

that’s why it’s always better to buy a vanity domain in Route53 or transfer to it

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)


1) update the vanity domain NS in GoDaddy and then create all subdomains in the same Route53 zone 2) do service discovery domain and subdomains, and then add CNAME to the vanity domain

ldlework avatar
ldlework

So I guess I have to go with 1)

ldlework avatar
ldlework

Which means just one zone…

ldlework avatar
ldlework

OK I’ll give it a go!

ldlework avatar
ldlework

Oh you guys were saying that I can use multiple zones, one root zone, multiple staging zones, if I add NS records to the root zone pointing to the staging zones.

ldlework avatar
ldlework

right?

ldlework avatar
ldlework

Which is what I’ll want because I’ll need things like “db.dev.domain.com” so I do need per-stage zones, not just per-stage records in the root zone.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yes

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you can use a separate zone per environment

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

add its name servers records to the root zone NS for the corresponding sub-domain

ldlework avatar
ldlework

excellent

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

we already had a similar discussion with all the examples here https://sweetops.slack.com/archives/CB6GHNLG0/p1552667297261900

I haven’t yet had a chance to try this, but it was on my mind.

Using Geodesic across multiple AWS accounts for each stage, I have Route 53 records to create. I have one domain name: acme.co.uk I own [acme.co.uk](http://acme.co.uk). I have [acme.co.uk](http://acme.co.uk) NS pointing to my ROOT account.

Scenario: I have to create r53 records, say [test.acme.co.uk](http://test.acme.co.uk). Naturally I want to create this on my testing account. I want this r53 record to be public. Naturally this means the testing account needs to have an [acme.co.uk](http://acme.co.uk) r53 public zone… but wait… I already have a public zone for this in ROOT with the public NS pointing to ROOT account.

Problem: Is this possible? Or to have public records for my one domain, must I assume a role into my ROOT account and only create public records there?

ldlework avatar
ldlework
 aws_route53_zone.root: error deleting Route53 Hosted Zone (Z1I50I6TDQ378M): HostedZoneNotEmpty
ldlework avatar
ldlework

oh god

ldlework avatar
ldlework

first with s3 buckets, now zones

loren avatar

AWS, and by extension terraform, protecting you from yourself

keen avatar

yeah deleting a zone is definitely something you almost never do outside of testing…

ldlework avatar
ldlework

How does one install a third party provider from git?

ldlework avatar
ldlework

Without manunally cloning it, etc

ldlework avatar
ldlework

oh you can’t

loren avatar

If the third party provider publishes packages for your platform, then you can download that and place it in the same directory as your terraform binary

loren avatar

But if they don’t publish packages, then you need to build it yourself

ldlework avatar
ldlework

Yeah I was hoping that there was a mechanism to tell terraform where to get the binary package from like there is with terraform modules

loren avatar

Unfortunately not

loren avatar

Though, modules don’t need to be built, so, not surprising really

ldlework avatar
ldlework

neither do binary packages

loren avatar

Well, exactly

loren avatar

Modules are not binary packages, they are just straight source code

ldlework avatar
ldlework

I get it.

ldlework avatar
ldlework

You guys ever get stuff like

 module.backend-worker.module.cicd.module.pipeline.module.build.aws_s3_bucket.cache_bucket: aws_s3_bucket.cache_bucket: error getting S3 Bucket Object Lock configuration: RequestError: send request failed
caused by: Get <https://us-west-1-qa-backend-worker-build-dnwylutrpukx.s3.us-west-1.amazonaws.com/?object-lock=>: dial tcp: lookup us-west-1-qa-backend-worker-build-dnwylutrpukx.s3.us-west-1.amazonaws.com on 192.168.1.1:53: no such host
ldlework avatar
ldlework

while refreshing state

ldlework avatar
ldlework

don’t know what’s oging on but I can’t seem to make it through a refresh

Tim Malone avatar
Tim Malone

yup. usually a temporary connectivity issue - just have to try again

Tim Malone avatar
Tim Malone

(or check if there’s any status page messages on increased API error rates/latency for your service & region)

ldlework avatar
ldlework

Right now for a given ECS service I specify the port and protocol in 3 different places: Once in the load_balancer block of the ECS service, once in the ALB listener, and once in the ALB Target Group. If I am trying to do SSL termination at the ALB, what needs the HTTPS details what needs the HTTP details?

ldlework avatar
ldlework

I’m guessing the listener gets the HTTPS, the target group gets HTTP and the ECS service gets HTTP

ldlework avatar
ldlework

well maybe the ECS also gets HTTPS?

ldlework avatar
ldlework

From the aws_ecs_service docs for the container port: The port on the container to associate with the load balancer.

ldlework avatar
ldlework

um

ldlework avatar
ldlework

I guess this means the internal port, so HTTP

ldlework avatar
ldlework
* module.alb.output.dns_name: 1:16: unknown variable accessed: var.domain in:

${var.stage}.${var.domain}
ldlework avatar
ldlework

When targetting my frontend module.

ldlework avatar
ldlework

But when I target my ALB module, it works fine?

ldlework avatar
ldlework

Lol my root module has an output that depends on the module.alb.output.dns_name value and it outputs just fine

ldlework avatar
ldlework

But when targetting my frontend… i get this error. It just never ends…

ldlework avatar
ldlework

The alb module definitely has a variable named domain

ldlework avatar
ldlework

The alb module is definitely getting passed the domain variable by the root module since I can target the alb module and apply it just fine.

ldlework avatar
ldlework

maybe a circular dependency

ldlework avatar
ldlework

doubt it though

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@ldlework as we already discussed (regarding the code pipeline), you can share your complete code (not just snippets) and people here could take a look and help you much faster. It’s difficult to answer anything without looking at the code

2019-04-04

mmuehlberger avatar
mmuehlberger

A quick question on best practices regarding Parameter Store/Chamber. We have around 40 secrets/config parameters needed for our app, that we import with chamber. How would you go about adding them to chamber. The database-related secrets, I’d add using terraform, when creating the database. Would you add the rest to TF as well, manually adding secret values later (which is what we did before), or would you use something entirely different?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

we write all secrets for the resources created with TF (e.g. RDS, Elasticache, DocumentDB) from TF when we apply. The rest of the secrets (e.g. k8s stuff, app secrets) we were writing manually (admin via geodesic). Maybe there is a better way of doing this

mmuehlberger avatar
mmuehlberger

Okay, thanks. That’s exactly the way I’m doing it (and thanks to chamber import/export it’s actually not too bad)

ldlework avatar
ldlework

I got everything working.

2
aws1
terraform1
oscarsullivan_old avatar
oscarsullivan_old

What were you working on @ldlework

ldlework avatar
ldlework

@oscarsullivan_old getting some Fargate services deployed behind ALB with automatic SSL challenge/termination

phanindra bolla avatar
phanindra bolla

How do i deploy AWS ASG ec2 through terraform as a blue green deployment . i am thinking about diff types of methods

  1. Create a Launch template which update/ creates new ASG ,new ALB/ELB and switch the R53 domain to new
  2. Create a new Launch template ,, ASG and ALB and update and target ALB to existing R53

please suggest me best way

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

#2 will save you on load balancer and looks simpler to implement

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
Simplify your Blue/Green deployment with AWS Application Load Balancerattachment image

Earlier this year, teams at Intuit migrated the AWS infrastructure for their web services to the Application Load Balancer (ALB) from the…

2019-04-05

loren avatar
Using Terraform for zero downtime updates of an Auto Scaling group in AWSattachment image

A lot has been written about the benefits of immutable infrastructure. A brief version is that treating the infrastructure components as…

loren avatar

personally, i also use terraform to wrap a cfn template for autoscaling groups and ec2 instances

1
chrism avatar

Seen that post a few times; yet to try it; does it work well with the cloudformation stuff?

loren avatar
Always delete/create with aws_cloudformation_stack when on_failure=DO_NOTHING · Issue #5204 · terraform-providers/terraform-provider-aws

Community Note Please vote on this issue by adding a reaction to the original issue to help the community and maintainers prioritize this request Please do not leave &quot;+1&quot; or &quot;me to…

Feature Request: Add support for Cloudformation Stack Termination Protection · Issue #3496 · terraform-providers/terraform-provider-aws

Affected Resource(s) aws_cloudformation_stack Background AWS released Termination protection for Cloudformation Stacks in August 2017: https://aws.amazon.com/about-aws/whats-new/2017/09/aws-cloudfo

loren avatar

neither is a show stopper for most usage, the first is really only an annoyance when developing, the second would be nice to have but can live without it for a while

loren avatar

the biggest benefits are being able to use cfn resource signals to determine instance health (and force terraform to wait until they are really ready) and the UpdatePolicy to easily manage blue/green or rolling updates

2
phanindra bolla avatar
phanindra bolla

I am still not able to understand the downside of using terraform autoscaling groups for non web server clusters. Can someone please care to explain?

ldlework avatar
ldlework

who told you there is a downside?

phanindra bolla avatar
phanindra bolla
Using Terraform for zero downtime updates of an Auto Scaling group in AWSattachment image

A lot has been written about the benefits of immutable infrastructure. A brief version is that treating the infrastructure components as…

phanindra bolla avatar
phanindra bolla

you can see that in this post , they say using terraform Cloudformation resource is preffered over ASG resource

loren avatar

it’s an opinion piece, not a matter of best practice or a generalized statement that will apply to all use cases. try both. deploy your app, update your app, destroy your app. figure out the workflows. use whatever works for you

2019-04-06

oscarsullivan_old avatar
oscarsullivan_old

What an odd combo

oscarsullivan_old avatar
oscarsullivan_old

Not an overly old article either

oscarsullivan_old avatar
oscarsullivan_old

Article:

CloudFormation is free, and by using it to manage the Auto Scaling groups in AWS, we are not increasing the vendor lock-in. So pragmatically, it is hard to find a reason not to leverage the functionality that is only available in CloudFormation. By embedding an aws_cloudformation_stack resource inside Terraform configuration, we get access to these capabilities, while still benefiting from the rich interpolation syntax and variable management in Terraform.

oscarsullivan_old avatar
oscarsullivan_old

It seems to think ASGs are not doable in TF.

loren avatar

i don’t read that conclusion in that quote at all

loren avatar

they simply say you can do things with an ASG in cloudformation that you cannot do in terraform because they are not exposed via an AWS API. this is simply true. doesn’t make ASG’s undoable in TF

loren avatar

and the two are definitely not one or the other. we use cfn in tf wherever necessary, as sometimes the tf resource just doesn’t yet exist. had tf accept guard duty invites via cfn (until yesterday, when we switched to the new tf resource). probably going use cfn to create email subscriptions to sns topics shortly

2019-04-07

Tim Malone avatar
Tim Malone

if you’re already using Terraform it’s definitely easier to do ASGs within TF and there’s nothing inherently wrong with doing so. but if you want to do rolling deployments without doing the extra heavy lifting yourself, CF already does it really well (it’s a CF feature, not an ASG feature). the article’s proposition is ‘why not have both?’ - which can be done by managing the CF stack in TF

6
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Good TL;DR @Tim Malone

1

2019-04-08

cabrinha avatar
cabrinha
terraform-aws-modules/terraform-aws-security-group

Terraform module which creates EC2-VPC security groups on AWS - terraform-aws-modules/terraform-aws-security-group

cabrinha avatar
cabrinha

in the readme example, they’re passing in a VPC ID as a CIDR block for a security group rule

cabrinha avatar
cabrinha
module "db_computed_merged_sg" {
  # omitted for brevity

  computed_ingress_cidr_blocks = ["10.10.0.0/16", "${data.aws_security_group.default.id}", "${module.vpc.vpc_id}"]
  number_of_computed_ingress_cidr_blocks = 3
}
cabrinha avatar
cabrinha

but I’m having some issue doing the same

cabrinha avatar
cabrinha

I wonder if this is just a typo in the example

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

maybe also try #terraform-aws-modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@Noah Kernis https://github.com/cloudposse/terraform-aws-ecs-web-app is an opinionated example of an web ECS app that uses other TF modules. It’s not supposed to be a generic module. You probably should fork it and add what you need, and remove what you don’t need

cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

Noah Kernis avatar
Noah Kernis

@Andriy Knysh (Cloud Posse) thank you for an insanely quick response. Makes sense to me. Had a feeling but wanted to 2x check. Thank you again!

johncblandii avatar
johncblandii

has anyone done ~/.terraformrc on CI to connect to TF Enterprise modules without manually writing the file to your CI server?

cabrinha avatar
cabrinha

anyone know of a way to generate data for all cidr_blocks of all VPCs?

cabrinha avatar
cabrinha

im trying to use data "aws_vpcs" "all" {} to get a list of all my VPC IDs, but not sure what to do after that …

cabrinha avatar
cabrinha

data "aws_vpc" "all" { id = "${data.aws_vpcs.all.ids}" } causes TF to crash lol

johncblandii avatar
johncblandii

you’re in an endless loop at that point. you’re calling a data query from a data query calling a data query from a data query calling….you get the idea.

johncblandii avatar
johncblandii

"${data.aws_vpcs.all.ids}" is accurate, but you would reference that elsewhere in your project

johncblandii avatar
johncblandii
data "aws_vpcs" "foo" {}

resource "aws_flow_log" "test_flow_log" {
  count = "${length(data.aws_vpcs.foo.ids)}"
  # ...
  vpc_id = "${element(data.aws_vpcs.foo.ids, count.index)}"
  # ...
}

output "foo" {
  value = "${data.aws_vpcs.foo.ids}"
}
cabrinha avatar
cabrinha

@johncblandii so how do I get the cidr blocks out of data.aws_vpcs.all.ids ?

johncblandii avatar
johncblandii

I’ve not had to do this so I have no clue

johncblandii avatar
johncblandii

what’s your use here?

johncblandii avatar
johncblandii

so it looks like you can take the id, use the aws_vpc instead of aws_vpcs and pull the cidr from there:

https://www.terraform.io/docs/providers/aws/d/vpc.html

AWS: aws_vpc - Terraform by HashiCorp

Provides details about a specific VPC

cabrinha avatar
cabrinha

@johncblandii the use is making a security group rule for all the CIDRs in a given region

johncblandii avatar
johncblandii

yeah, then the above should be fine

cabrinha avatar
cabrinha

so with that aws_vpc data source

johncblandii avatar
johncblandii

feed the id you want into the aws_vpc data query and you should be golden

cabrinha avatar
cabrinha

do i just use count?

johncblandii avatar
johncblandii

you can pull just one from the aws_vpcs

cabrinha avatar
cabrinha

thats the thing, I want to feed in all IDs

johncblandii avatar
johncblandii

you’re creating SGs across all VPCs at once?

cabrinha avatar
cabrinha

no

cabrinha avatar
cabrinha

the SG will be in one VPC

cabrinha avatar
cabrinha

but it’ll allow traffic from other VPCs

johncblandii avatar
johncblandii

so why loop or count?

johncblandii avatar
johncblandii

ahh…so you want the sg to be in a loop

cabrinha avatar
cabrinha
terraform-aws-modules/terraform-aws-security-group

Terraform module which creates EC2-VPC security groups on AWS - terraform-aws-modules/terraform-aws-security-group

cabrinha avatar
cabrinha

and this module seems to only take in cidr_blocks or other security group ids

cabrinha avatar
cabrinha
VPC ID in computed_ingress_cidr_blocks? · Issue #112 · terraform-aws-modules/terraform-aws-security-group

Example in README shows VPC ID being passed into computed_ingress_cidr_blocks list. Is this module supposed to allow VPC IDs to be passed into that parameter? module &quot;db_computed_sg&quot; { # …

cabrinha avatar
cabrinha

because their example shows them passing in VPC IDs

cabrinha avatar
cabrinha

If I could pass in just the VPC IDs, that’d be awesome

johncblandii avatar
johncblandii

have you tried using count on the sg module?

cabrinha avatar
cabrinha

nope, how would that look?

cabrinha avatar
cabrinha

i dont think it has that parameter

johncblandii avatar
johncblandii
module "http_sg" {
  source = "terraform-aws-modules/security-group/aws"
  count = "${length(data.aws_vpcs.all)}"

  ...
}
cabrinha avatar
cabrinha

besides i dont need multiple SGs, I just need one with a lot of rules

johncblandii avatar
johncblandii

ah

johncblandii avatar
johncblandii

so you want ingress_cidr_blocks to be “all vpcs”?

cabrinha avatar
cabrinha

all_vpcs.cidr_blocks

cabrinha avatar
cabrinha

unless that module can take in VPC IDs instead of cidr blocks, but I dont think it can, eventhough they have an example in their readme doing just that

johncblandii avatar
johncblandii

and, for clarity, you are not wanting peering, right?

johncblandii avatar
johncblandii

you just want to allow traffic

cabrinha avatar
cabrinha

nope, peering has been sorted out already

cabrinha avatar
cabrinha

yeah just want the rules

johncblandii avatar
johncblandii

so we just use an aws_security_group with ingress defined by other security groups. they’re all internal to the same vpc, though.

johncblandii avatar
johncblandii

your github issue seems to have code showing how to do it

johncblandii avatar
johncblandii

did you try that and it failed?

cabrinha avatar
cabrinha

yeah i think for some reason you actually cannot pass in VPC IDs

cabrinha avatar
cabrinha

I think this might work for me:

data "aws_vpcs" "all" {}

data "aws_vpc" "all" {
  count = "${length("${data.aws_vpcs.all.ids}")}"
  id    = "${element("${data.aws_vpcs.all.ids}", count.index)}"
}
cabrinha avatar
cabrinha

ingress_cidr_blocks = ["${data.aws_vpc.all.*.cidr_block}"]

johncblandii avatar
johncblandii

i see the computed_ingress_cidr_blocks variable throughout a lot of modules in that repo

cabrinha avatar
cabrinha

computed_ingress_cidr_blocks should be it, but i dont see anything in the source code that takes a VPC ID and returns cidr blocks

johncblandii avatar
johncblandii

maybe just try to output those cidr_block to verify you get back the cidr then you can likely just use https://www.terraform.io/docs/providers/aws/r/security_group.html

AWS: aws_security_group - Terraform by HashiCorp

Provides a security group resource.

johncblandii avatar
johncblandii

ingress takes a list of cidr_blocks

cabrinha avatar
cabrinha

this is working great: ingress_cidr_blocks = ["${data.aws_vpc.all.*.cidr_block}"]

johncblandii avatar
johncblandii

here is our db sg:

  ingress {
    description = "Application traffic"
    from_port   = 5432
    to_port     = 5432
    protocol    = "TCP"

    security_groups = [
      "${module.vpc.internal_only_security_group_id}",
      "${module.vpc.web_security_group_id}",
    ]
  }
johncblandii avatar
johncblandii

oh, great…so you got it working?

cabrinha avatar
cabrinha

yep

johncblandii avatar
johncblandii

sweet

cabrinha avatar
cabrinha
data "aws_vpcs" "all" {}

data "aws_vpc" "all" {
  count = "${length("${data.aws_vpcs.all.ids}")}"
  id    = "${element("${data.aws_vpcs.all.ids}", count.index)}"
}
johncblandii avatar
johncblandii

good deal

johncblandii avatar
johncblandii

glad you got it

cabrinha avatar
cabrinha

thanks for the help

johncblandii avatar
johncblandii

np

Tim Malone avatar
Tim Malone

fwiw since you mentioned it above - count doesn’t work for modules, sadly

cabrinha avatar
cabrinha

i dont need it to but thanks

2019-04-09

Arvind avatar

Help !! Regarding Error

* provider.vault: failed to create limited child token: Error making API request.

URL: POST <https://vault.abc.net/v1/auth/token/create>
Code: 403. Errors:

* 1 error occurred:

* permission denied
Arvind avatar

I am trying to get my AWS KEYS from Vault.

Arvind avatar
provider "vault" {
}

data "vault_generic_secret" "aws_auth" {
  path = "secret/project/abc/infra_secrets"
}

provider "aws" {
  access_key = "${data.vault_generic_secret.aws_auth.data["access_key"]}"
  secret_key = "${data.vault_generic_secret.aws_auth.data["secret_key"]}"
  #profile = "${var.profile}"
  #profile = "dev"
  region     = "${var.region}"
}

#terraform #vault

kritonas.prod avatar
kritonas.prod

Question regardin module cloudposse/terraform-aws-s3-bucket: How can I enable “Static website hosting” on the bucket created via the module?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@kritonas.prod you can use this module to create S3 website https://github.com/cloudposse/terraform-aws-s3-website

cloudposse/terraform-aws-s3-website

Terraform Module for Creating S3 backed Websites and Route53 DNS - cloudposse/terraform-aws-s3-website

kritonas.prod avatar
kritonas.prod

Thanks @Andriy Knysh (Cloud Posse) I’ll have a look!

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

here is a working example on how to use the module together with CloudFront CDN https://github.com/cloudposse/terraform-root-modules/blob/master/aws/docs/main.tf#L72

cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” invocations for provisioning reference architectures - cloudposse/terraform-root-modules

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

that’s how https://docs.cloudposse.com/ is deployed

kritonas.prod avatar
kritonas.prod

@Andriy Knysh (Cloud Posse) thank you so much, that’s exactly what I was looking for! sorry for the late reply

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Glad it worked for you

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

Hi guys, do you have any module for privatelink?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@AgustínGonzalezNicolini CloudPosse doesn’t have such a module, maybe other people here have it

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
Traveloka

Enabling Mobility. Traveloka has 2 repositories available. Follow their code on GitHub.

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

thanks!

Arvind avatar
* provider.vault: failed to create limited child token: Error making API request.

URL: POST <https://vault.or1.net/v1/auth/token/create>
Code: 403. Errors:

* 1 error occurred:

* permission denied
Arvind avatar

Any pointers

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

No experience with the vault provider.

Arvind avatar

Is there any way I can use my AWS access and secret key from remote I don’t want to set environmental variables for aws access and secrets key or locally

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

in geodesic, we use assume role to login to diff accounts. But you will have to provision the required roles, and in your TF modules add the code for TF to assume the roles as well, e.g. https://github.com/cloudposse/terraform-root-modules/blob/master/aws/eks/main.tf#L11

cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” blueprints for provisioning reference architectures - cloudposse/terraform-root-modules

Arvind avatar

Let me integrate the same

Arvind avatar

Thanks

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

geodesic uses aws-vault to store the credentials

Arvind avatar
cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” blueprints for provisioning reference architectures - cloudposse/terraform-root-modules

Arvind avatar

Not understand where i need to add this

provider "vault" {
}

data "vault_generic_secret" "aws_auth" {
  path = "secret/lav/projects/infra_secrets"
}

provider "aws" {
  access_key = "${data.vault_generic_secret.aws_auth.data["access_key"]}"
  secret_key = "${data.vault_generic_secret.aws_auth.data["secret_key"]}"
  #profile = "${var.profile}"
  profile = "dev"
  region     = "${var.region}"
}
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

https://github.com/99designs/aws-vault is a completely different thing from the HashiCorp Vault. We did not use the HashiCorp Vault provider

99designs/aws-vault

A vault for securely storing and accessing AWS credentials in development environments - 99designs/aws-vault

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

It also supports aws-okta if you want to login with SAML provider

phanindra bolla avatar
phanindra bolla

Hi Guys, Question regarding ASL-ELB . Once my stack are deployed with AWS ASG and a classic load balancer . Next terraform plan and apply is deregistering the instances behing the load balancer. I am unable to find the root cause for deregistering the instances . How do i make sure ASG instances are always registered under ELB

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@phanindra bolla it sounds more like terraform wants to recreate something and that’s why they are getting deregistered.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

if you share the plan output, that would help more.

2019-04-10

Vidhi Virmani avatar
Vidhi Virmani

Hi,

I was trying to run this code on my local https://www.terraform.io/docs/providers/helm/repository.html but receiving this error

helm_release.mydatabase: Couldn't load repositories file (helm/repository/repositories.yaml).
Vidhi Virmani avatar
Vidhi Virmani

sorry this was my mistake I have set the home as ./helm. By removing home in provider fixed the issue

1
oscarsullivan_old avatar
oscarsullivan_old

Strange, I’ve had to change my values for bucket prefix

oscarsullivan_old avatar
oscarsullivan_old

Working: TF_BUCKET_PREFIX="backend"

oscarsullivan_old avatar
oscarsullivan_old

old way: export TF_CLI_INIT_BACKEND_CONFIG_KEY="backend"

oscarsullivan_old avatar
oscarsullivan_old
Terraform v0.11.11
+ provider.aws v2.5.0
+ provider.local v1.2.0
+ provider.null v2.1.0
+ provider.template v2.1.0
oscarsullivan_old avatar
oscarsullivan_old

Any way to have R53 zones for acme.co.uk on two accounts? Got records like [dev-api.acme.co.uk](http://dev-api.acme.co.uk) on account 1 and [staging-api.acme.co.uk](http://staging-api.acme.co.uk) on account 2

oscarsullivan_old avatar
oscarsullivan_old

But having the acme.co.uk zones on multiple accounts obviously isn’t picked up. Feel like a NS needs updating somewhere to listen to all the accounts….?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

You can do cross-account route53/iam

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

but the zone must exist in exactly one account

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

or you can delegate zones

oscarsullivan_old avatar
oscarsullivan_old

Done exactly that

1
oscarsullivan_old avatar
oscarsullivan_old

Have done a cross-acount r53 IAM

oscarsullivan_old avatar
oscarsullivan_old

With an aliased provider for R53 resources!

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

nice! you’re moving fast

oscarsullivan_old avatar
oscarsullivan_old

The reason for this is because I originally had a zone on each account called [develop.acme.co.uk](http://develop.acme.co.uk), however my *.[acme.co.uk](http://acme.co.uk) SSL was single level subdomain and I couldn’t figure out how to get a second level SSL cert

oscarsullivan_old avatar
oscarsullivan_old

The only other option I can think of is having all R53 resources be run against an IAM role for the root account which has the functional [acme.co.uk](http://acme.co.uk) zone

oscarsullivan_old avatar
oscarsullivan_old

^ That deffo doesn’t have in mind the Terraform / Geodesic model

Steven avatar

Sounds like your thinking more about AWS than DNS. This is an easy DNS issue. AWS has nothing to do with it. You can spread DNS subdomains across as many accounts as you want. I have multiple per account. You just need to create a NS record for each one in it’s parent zone

Steven avatar

As far as SSL, you need to add aliases when the SSL cert is created for each subdmain you want it to apply too

Steven avatar

So, if you created a SSL cert for *.acme.co.uk you would have added an alias for *.develop.acme.co.uk to it

oscarsullivan_old avatar
oscarsullivan_old
  • I have *.[acme.co.uk](http://acme.co.uk) SSL cert
  • On my root account I have a working [acme.co.uk](http://acme.co.uk) R53 zone (connected to our domain providers records)
  • On my develop account I have either [develop.acme.co.uk](http://develop.acme.co.uk) or [acme.co.uk](http://acme.co.uk) R53 zone

I would like to have [develop.api.acme.co.uk](http://develop.api.acme.co.uk) use my *.[acme.co.uk](http://acme.co.uk) SSL certificate, somehow

oscarsullivan_old avatar
oscarsullivan_old

So it’s either I change it to [develop-api.acme.co.uk](http://develop-api.acme.co.uk)

Steven avatar

Can’t without recreating the cert

Steven avatar

SSL wildcards are single level only

oscarsullivan_old avatar
oscarsullivan_old

Ah right

oscarsullivan_old avatar
oscarsullivan_old

I would rather not have to use two level certs

oscarsullivan_old avatar
oscarsullivan_old

I would like to have multiple [acme.co.uk](http://acme.co.uk) zones across my account and them all work publically

oscarsullivan_old avatar
oscarsullivan_old

An alternative I see is have them be private zones (all accounts are VPC peered)

oscarsullivan_old avatar
oscarsullivan_old

so when I go onto VPN I’ll get the DNS records

Steven avatar

What I do, is for each subdomain x.example.com I create a cert with *.x.example.com and *.example.com that everything in that subdomain can use

Steven avatar

I also have 3 and 4 level SSL certs in my org

oscarsullivan_old avatar
oscarsullivan_old

Where do you do this

oscarsullivan_old avatar
oscarsullivan_old

Atm I’m stuck with certificates from godaddy

oscarsullivan_old avatar
oscarsullivan_old

Keen to move cert management to ACM

oscarsullivan_old avatar
oscarsullivan_old

But I think I would invalidate my existing, prod live, cert in the process

Steven avatar

I organize multiple app environments per AWS account. We decided to reflect this as name spacing in DNS as app.env.account.company.com. I create SSL certs to handle all layers so I can create DNS aliases at any level

Steven avatar

You can have many different certs for the same thing (*.example.com) as long as a given service only uses only one of them

oscarsullivan_old avatar
oscarsullivan_old

And you manage this in ACM?

Steven avatar

Yes. It is easy there because it can be fully automated in terraform

Steven avatar

It was also done this way to simplify terraform use. The run that setups up the route53 zone needs access to 2 AWS accounts (subdomain and parent domain accounts), but after that other terraform runs only need to use the subdomain account

phanindra bolla avatar
phanindra bolla

@Erik Osterman (Cloud Posse) Please checkout the terraform plan . This is what my plan changes when i re run the terraform life cycles .

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

can you share the code in this thread where you attach the instances?

Samuli avatar

@oscarsullivan_old why do you think using ACM would invalidate your godaddy certs?

oscarsullivan_old avatar
oscarsullivan_old

I think you have to point ‘it’ to AWS ?

oscarsullivan_old avatar
oscarsullivan_old

Also I can’t find a place to actually give an ACM CSR to godaddy

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you can’t give AWS cert to GoDaddy, or to anybody else.They are not exportable and can be used only with other AWS services

oscarsullivan_old avatar
oscarsullivan_old

Thanks. What I meant was I go to create a CA and you have a CSR that needs to be given to the parent CA – don’t htink you can do that with CA

Samuli avatar

You should first solve how you manage DNS..

Samuli avatar

I don’t know if godaddy supports delegating a subdomain to AWS but if it does not then you would have to migrate everything (DNS) to AWS

Samuli avatar

After that ACM can use DNS to validate the domains you want to have SSL certs generated for

praveen avatar
praveen

Hi, Do we have an example of creating a cloud-init module with multiple cloud init configurations within it. So that the terraform code can source the cloud-init module and use specific cloud-init config from the cloud-init module. Can we make cloud-init template_file optional so that we can render specific template_file in terraform code depends on the requirement

praveen avatar
praveen
Template: cloudinit_multipart - Terraform by HashiCorp

Renders a multi-part cloud-init config from source files.

praveen avatar
praveen

making template_files optional and render only template_file what is needed for end terraform code >

Nikola Velkovski avatar
Nikola Velkovski

Hi @praveen there’s an open pr where this resource is being used have a look, https://github.com/cloudposse/terraform-aws-cloudwatch-agent/pull/1 it should help you getting started.

Cloudwatch agent by parabolic · Pull Request #1 · cloudposse/terraform-aws-cloudwatch-agent

This PR includes: a module for installing a cloudwatch agent on ec2 instances. documentation for it ( examples, inputs, outputs ) I excuse myself for the massive PR. If needed I can split it up i…

praveen avatar
praveen

Hi @Nikola Velkovski, My question was about cloud-init

praveen avatar
praveen

rendering terraform

praveen avatar
praveen

let me know if I am confusing you

Nikola Velkovski avatar
Nikola Velkovski
cloudposse/terraform-aws-cloudwatch-agent

Contribute to cloudposse/terraform-aws-cloudwatch-agent development by creating an account on GitHub.

Nikola Velkovski avatar
Nikola Velkovski

check this file out

Nikola Velkovski avatar
Nikola Velkovski

the resource is the same as the one you where asking about.

praveen avatar
praveen

@Nikola Velkovski the current example is sourcing multiple cloud init configurations and merging them. My requirement is to create separate cloud-init module, with all yaml files (configuration files ) required for complete environment is made available within it. For end Terraform code when I source the cloud-init module I should be able to render specific cloud-init config file for the specific service(without rendering all configuration files)

praveen avatar
praveen

which means the cloud-init module should omit(making all template_files optional) all cloud-init files and render specific file needed for the service/terraform code

praveen avatar
praveen

am i making sense. I mean, can this be achieved.

Nikola Velkovski avatar
Nikola Velkovski

that will not be easily doable because of Yamls requirement for strict spacing. Maybe if passing the pieces base64 encoded.

praveen avatar
praveen

is it, let me prepare a module and test it to see if we can achieve it. I will share the module once i create

Nikola Velkovski avatar
Nikola Velkovski

praveen avatar
praveen

As this approach being new, wanted to to check if it is doable

praveen avatar
praveen

Thank you Nikola

Nikola Velkovski avatar
Nikola Velkovski

you are welcome

Steven avatar

@praveen I did this type of thing in a different tool years ago. If you create a template for each cloud-init section and then either concat them together or use a template to put them together with a little conditional logic you should be able to do this

praveen avatar
praveen

hi Steven, can I have reference to the repo, so that I can refer to it

Steven avatar

The one that I did was in puppet for a config file for something else. So, the logic would be different (also not sure where it is). But the concept should work. Probably will not be easy to debug or elegant

Steven avatar

I remember in puppet it worked well, but the code was not easy to understand

praveen avatar
praveen

Sure Steven, let me create one and try. Thanks for the info Steven

Steven avatar

welcome

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Office Hours Today from 11:30 AM to 12:20 PM (PST) at https://zoom.us/j/684901853

Rich Allen avatar
Rich Allen

hiya, so forgive me if this a dumb question, but I’m new to the community and I’ve found you through the registry and it seems this is a fairly active set of maintained modules and contributers. I’m looking to reproduce something like https://docs.aws.amazon.com/quickstart/latest/compliance-nist/overview.html in terraform. I’m in the experiment stage and so I wrote a more simple public private subnet without peering or the addtional things in the diagram. At this point, I’m not exactly sure what bit’s and pieces will make sense and how to best ultilze some of the modules and aim for something closer to my goal on this iteration.

Overview - Standardized Architecture for NIST-based Assurance Frameworks on AWS

Overview of the NIST-based standardized architecture on AWS: topology, AWS services, best practices, and cost and licenses.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

hey @Rich Allen welcome

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
aws-quickstart/quickstart-compliance-nist

AWS Quick Start Team. Contribute to aws-quickstart/quickstart-compliance-nist development by creating an account on GitHub.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it’s in CloudFormation, but should give you ideas what needs to be done

Rich Allen avatar
Rich Allen

yes, I was hoping to remain cloud agnostic about it for future purposes. We use aws right now, however for this particular need we’d also like to do other providers.

loren avatar

Strongly recommend this read also, https://bravenewgeek.com/multi-cloud-is-a-trap/

Multi-Cloud Is a Trap

It comes up in a lot of conversations with clients. We want to be cloud-agnostic. We need to avoid vendor lock-in. We want to be able to shift workloads seamlessly between cloud providers. Let me s…

1
Rich Allen avatar
Rich Allen

this looks very interesting, I gave it a scan and will review it later. I’m not sure if this addresses that but my worry is not to run a single application in HA/Failover in many clouds, we will deploy slightly different variotions of a basic web application stack (something like django or symfony). My thought is, even if we have to maintain a few different stacks (azure, gcp, aws), we don’t have to have everyone know CF + Terraform. I’m also considering k8s but at this point I feel like k8s is a challenge and we’re not really super mature our CICD/Iaac yet. That read should help me understand my approch avoiding CF. It may be just as easy to use the aws_cloudformation_stack, that’s seems to be a bit of an extra layer of abstraction but it’s something I still need to look into.

Rich Allen avatar
Rich Allen

it just seemed like this was common, and before I went out and wrote something

Rich Allen avatar
Rich Allen

just wanted to check in with some folks who might have advice or a module I was missing.

Rich Allen avatar
Rich Allen

your suggestion is my exact plan at the moment haha

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yea, when you look at those templates, you will have more info on what needs to be implemented

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

also, TF is not cloud agnostic either, it’s just the same syntax, but different resources and modules

2
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
aws_route53_record `allow_overwrite` deprecation will break ability to update `SOA` · Issue #7846 · terraform-providers/terraform-provider-aws

Community Note Please vote on this issue by adding a reaction to the original issue to help the community and maintainers prioritize this request Please do not leave &quot;+1&quot; or &quot;me to…

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

deprecation reverted

1

2019-04-11

Vidhi Virmani avatar
Vidhi Virmani

Hi, Has someone tried to setup istio using terraform?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

As opposed to using helm?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

…otherwise, using terraform to call helm to install the official chart?

2019-04-12

Raju avatar

Hello

Raju avatar
It's failing while trying to aggregate policies · Issue #4 · cloudposse/terraform-aws-iam-role

I am trying to create an iam role using this module. The template file looks like below data &quot;aws_iam_policy_document&quot; &quot;resource_full_access&quot; { statement { sid = &quot;FullAcces…

Raju avatar

May be I am doing something wrong and one of you guys can help to sort it out

renaldrozario avatar
renaldrozario

Which one would you vote for… remote exec or userdata?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

hey @Raju did @Igor Rodionov get back to you?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

He’s the one who wrote/maintains that module

2019-04-13

Raju avatar

Hi @Erik Osterman (Cloud Posse) Nops, I am yet waiting for a response on it

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Raju sorry about that. @Igor Rodionov has been incredibly busy on another project. I’ll ping him again next week.

Raju avatar

Thanks a lot

Igor Rodionov avatar
Igor Rodionov

@Raju can you provide the versions of terraform and aws provider

Igor Rodionov avatar
Igor Rodionov

You can ran terraform version

Igor Rodionov avatar
Igor Rodionov

I have

Terraform v0.11.11
+ provider.aws v2.6.0
+ provider.null v2.1.1
+ provider.random v2.1.1

Your version of Terraform is out of date! The latest version
is 0.11.13. You can update by downloading from www.terraform.io/downloads.html
Raju avatar

The aws and null provider versions are different

Raju avatar
Terraform v0.11.11
+ provider.aws v1.8.0
+ provider.null v1.0.0
+ provider.random v2.1.1

Your version of Terraform is out of date! The latest version
is 0.11.13. You can update by downloading from www.terraform.io/downloads.html
Julio Tain Sueiras avatar
Julio Tain Sueiras

have you guys heard of pulumi? at this point, I have severe distaste of it

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I’ve also heard the same. In fact, I’ve not heard anything positive yet from it.

That said, i want to like it given the short comings of HCL.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

So I remain optimistic that by the time we do dig into it, it’s matured to the point it solves a real problem for us.

Julio Tain Sueiras avatar
Julio Tain Sueiras

the general tone of the marketing, the ideal and its execution is pretty weak, and the fact that is a full SaaS service is a main issue for me

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I didn’t realize it was full-SaaS. That’s a deal breaker.

Andrew Nazarov avatar
Andrew Nazarov

AFAIK they provide on-prem/self-hosted options. Also Pulumi could store its state on the local filesystem instead of doing REST API calls.

1
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

hi @Julio Tain Sueiras, we heard of it, looked at some examples, but did not actually use it

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

i thought it was nice to try b/c it uses general purpose languages (Python, Go, Node) so could have much fewer restrictions than terraform

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

also can deploy k8s using the same language

Julio Tain Sueiras avatar
Julio Tain Sueiras

@Erik Osterman (Cloud Posse) my big issue with pulumi is mostly stem from them piggybacking from terraform, but at the same time dissing terraform

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I like that they piggy back on terraform though. Can you imagine the amount of trade skill/knowhow/lessons learned baked into the terraform providers? I would hate to have to go through all that again in another system. That said, I guess the way I’ve been mentally painting pulumi is as the equivalent of SASS for HCL. But I haven’t actually tried using pulumi in any way.

Julio Tain Sueiras avatar
Julio Tain Sueiras

(their provider is actually terraform provider)

Julio Tain Sueiras avatar
Julio Tain Sueiras

@Andriy Knysh (Cloud Posse) my opinion about General purpose languages is , that it def can help with less restriction, but then at the same time move away from the ideal of the code is the infrastructure

2019-04-14

2019-04-15

kskewes avatar
kskewes

Look at the onboarding process of new employees with something like pulumi versus terraform. Lot more skill with and best practices with the latter out there.

Abel Luck avatar
Abel Luck

has anyone used xterrafile to manage terraform deps ?

1
Abel Luck avatar
Abel Luck
devopsmakers/xterrafile

XTerrafile is a pure Go tool for managing vendored modules and formulas using a YAML file - devopsmakers/xterrafile

joshmyers avatar
joshmyers

Nope but looks interesting, seeing more and more of these small Terraform helper tools for managing and vendoring modules

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Abel Luck do you know if it works recursively?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

(for modules composed of other modules)

Abel Luck avatar
Abel Luck

i haven’t tried it yet, but that would be a requirement for my use case as well

Abel Luck avatar
Abel Luck

as much as i like the community taking the initiative to develop tools, i can’t help but feel it should be a part of terraform proper.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

yea, we recently tried to do this with the help of @tamsky

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

it’s not an easy problem to solve.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

nested modules, pinned at different versions of the same modules. we were able to mock up a prototype using terraform init to fetch all modules, parsed modules.json with jq to get the inventory, and did and some sed foo to rewrite sources to local ones.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

but the part that got messy is we couldn’t really use a vendor/ folder b/c it would mean huge amounts of ../../../.././../vendor/github.com/cloudposse/terraform-null-label/0.4.5 type stuff

loren avatar

something like govendor/glide/etc for terraform…. With a true hcl parser/templater and round trip read/write support

loren avatar

I wonder if hashicorp would consider a terraform vendor or terraform package command ..?

tamsky avatar

A TF_MODULES_LOAD_PATH var could help too

1
SweetOps avatar
SweetOps
06:03:55 PM

Are you using some of our terraform-modules in your projects? Maybe you could leave us a testimonial! It means a lot to us to hear from people like you.

2019-04-16

Julio Tain Sueiras avatar
Julio Tain Sueiras

@Andriy Knysh (Cloud Posse) have you guys used nix before?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@Julio Tain Sueiras what is nix?

Julio Tain Sueiras avatar
Julio Tain Sueiras
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Looks interesting, we didn’t use it

Julio Tain Sueiras avatar
Julio Tain Sueiras

the most interesting use of it for me is baking packages into docker image

Julio Tain Sueiras avatar
Julio Tain Sueiras

so no more using ansible or Dockerfile to do apt install or yum install etc

Julio Tain Sueiras avatar
Julio Tain Sueiras

is just

Julio Tain Sueiras avatar
Julio Tain Sueiras
contents = [
   vim
   terraform
]
johncblandii avatar
johncblandii

Codefresh’s UI looks really good. There are some quality updates since the last UI I saw

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Yea, the are constantly improving it. In fact, there’s even a newer UI than in this demo that they are about to release.

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

That update will make it easier to visually deal with hundreds of repos and dozens of pipelines per repo.

1

2019-04-17

shaiss avatar

anyone have exp w/ the TF ALB resource, particularly the access_logs block. I define an existing bucket, but get access denied. note that this is in dev, I created the bucket and the TF apply is running under my account

Steven avatar

Specifically access denied to what?

shaiss avatar

aws_lb.alb_example: Failure configuring LB attributes: InvalidConfigurationRequest: Access Denied for bucket: shaitestiasapi[hidden]. Please check S3bucket permission status code: 400, request id: 5ba27350-610e-11e9-af7f-1535341880fe

shaiss avatar

in cloudtrail I see `“errorCode”: “InvalidConfigurationRequestException”, “errorMessage”: “Access Denied for bucket: shaitestiasapi[hidden]. Please check S3bucket permission”,

shaiss avatar

The AWS LB documention shows no references for access logs, so I’m wondering if this is a bug or old feature in TF: https://docs.aws.amazon.com/cli/latest/reference/elbv2/index.html

shaiss avatar

If I comment the access_log block out, then the TF template deploys fine:

# access_logs {

# bucket = “${var.s3_alb_logs_bucket}”

# prefix = “${var.log_prefix}”

# enabled = false

# }

Steven avatar

Your account needs permissions to S3 bucket to setup and LB needs permissions to write the logs

shaiss avatar

are there any particular permissions?

shaiss avatar

I have full admin

Steven avatar

Then you’re good for the terraform run. But you need to give the LB permissions to S3

Steven avatar

Should be an example of that somewhere

shaiss avatar

@Steven thx for the help, yep, I’m looking for that example as that’s the part that’s holding me back

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

here’s how we create S3 bucket with policy for LB logs (it’s Elastic Beanstalk, but should be the same for any LB) https://github.com/cloudposse/terraform-aws-elastic-beanstalk-environment/blob/master/main.tf#L1029

cloudposse/terraform-aws-elastic-beanstalk-environment

Terraform module to provision an AWS Elastic Beanstalk Environment - cloudposse/terraform-aws-elastic-beanstalk-environment

shaiss avatar

ty!

johncblandii avatar
johncblandii

Hashicorp email just came through
Maybe You Don’t Need Kubernetes, Unleashing Terraform 0.12, and Nomad 0.9 & Vault 1.1 Releases

johncblandii avatar
johncblandii
06:14:26 PM
1
johncblandii avatar
johncblandii

^ me right now at seeing .12 mentioned

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I did the same double take

johncblandii avatar
johncblandii

I got amped because I thought it was them releasing it

johncblandii avatar
johncblandii

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Even went to the github releases page thinking…. “waaaaaiit a minute, did I miss something?”

johncblandii avatar
johncblandii

LMBO

johncblandii avatar
johncblandii

my sprint was about to get jacked up!

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

lol

johncblandii avatar
johncblandii
Unleashing the Power of Terraform 0.12attachment image

Overview of some Terraform 0.12 examples.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Office Hours Today from 11:30 AM to 12:20 PM at https://zoom.us/j/684901853

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

(PST)

shaiss avatar

has anyone runinto challenges deploying an s3 bucket when the role has a policy w/ s3:GetBucketWebsite deny?

shaiss avatar
  • aws_s3_bucket.b: aws_s3_bucket.b: error getting S3 Bucket website configuration: AccessDenied: Access Denied status code: 403, request id: 58F8BCE915142469, host id: BJd1A2Zr/RhBG7CNU+zOe4cFoCW63zt+h9ea6jsqC/D7fl3x90uxIrvBIVMezFY8sr5/yxNYdZ0=
shaiss avatar

resource “aws_s3_bucket” “b” { bucket = “my-tf-test-buckeas231231232144445” acl = “private”

tags = { Name = “test bucket” Environment = “Dev” } }

provider “aws” { region = “us-east-1” }

shaiss avatar

that’s the TF code, nothing else

shaiss avatar

IAM policy: { “Version”: “2012-10-17”, “Statement”: [ { “Sid”: “VisualEditor0”, “Effect”: “Deny”, “Action”: [ “s3:DeleteBucketWebsite”, “s3:GetBucketWebsite”, “s3:PutBucketWebsite” ], “Resource”: “*” } ] }

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you denied those actions. any reason for doing it?

shaiss avatar

not my env, customers that insists those have to be denied

loren avatar

heh, chicken, meet egg

loren avatar

might need some kind of condition on the statement such that it doesn’t apply to whatever principal you want to use to apply the tf config

shaiss avatar

yeah, that’s what I’m thinking, but oddly I can run the create bucket via CLI with no issues. So TF is doing something with the CLI call beyond the basics I’m asking it to do

loren avatar

yes, TF does a lot of “get”-type calls to check state

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@shaiss do you create the same policy with Deny when using cli?

shaiss avatar

policy is already their when they setup the account

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

hmm…

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

both TF and cli call the same AWS API

loren avatar

The AWS cli is only doing the create bucket though, TF is trying to manage all the attributes on the bucket and so queries the current state first

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

No, that would be a security hole :) the policy is already in the account as I understand it

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@shaiss might be creating S3 website bucket in TF (not actually using the code shown above), but just plain bucket from the cli

loren avatar

i’m not following that… his role/user is not allowed the s3:GetBucketWebsite action, but TF is clearly attempting to do exactly that

shaiss avatar

@Andriy Knysh (Cloud Posse) that shouldn’t be the case w/ the TF code I posted above as it’s pulled directly from the Terraform doc for creating a basic bucket

shaiss avatar

@loren exactly

loren avatar

all i’m saying is that TF makes many api calls when it refreshes state, because TF isn’t doing a single api action in an s3_bucket resource

shaiss avatar

I love to see the underlying API call TF is making, I enabled tracing but the output is still a bit cryptic

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

if the policy is a resource (bucket) policy, creating S3 website would not work in any case

shaiss avatar

@Andriy Knysh (Cloud Posse) the policy is an IAM policy

shaiss avatar

that IAM policy is attached to the role I’m assuming

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
Identity-based policies – Attach managed and inline policies to IAM identities (users, groups to which users belong, or roles). Identity-based policies grant permissions to an identity.

Resource-based policies – Attach inline policies to resources. The most common examples of resource-based policies are Amazon S3 bucket policies and IAM role trust policies. Resource-based policies grant permissions to a principal entity that is specified in the policy. Principals can be in the same account as the resource or in other accounts.
loren avatar

set yourself up with a throwaway aws account for the free tier, then setup a role with zero read privs, use that with TF to create the bucket. then you’ll see all the aws api calls that TF is performing, as you get denied one-by-one, grant yourself that specific api read action

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)


that IAM policy is attached to the role I’m assuming

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

are you assuming the same role when using the cli?

loren avatar

in TF, a different set of api actions is required to create the bucket the first time vs applying the config again (even with no changes) due to the extra read cycle

loren avatar
terraform-providers/terraform-provider-aws

Terraform AWS provider. Contribute to terraform-providers/terraform-provider-aws development by creating an account on GitHub.

loren avatar
terraform-providers/terraform-provider-aws

Terraform AWS provider. Contribute to terraform-providers/terraform-provider-aws development by creating an account on GitHub.

loren avatar

skim that file for s3conn. to get an idea of the api actions required

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

i’m just trying to say that if @shaiss assumes the role with the policy when using TF, then it will not work b/c/ of the permissions. With cli, if he assumes the same role, it should not work either. If he uses another way to login with cli, then it would work since the policy is not attached to the other credentials. If he assumes the same role using cli and it works, then it’s very strange

loren avatar

right, the difference is that with the aws cli, the only thing he did is create-bucket

loren avatar

TF does much more than just create-bucket when operating on an aws_s3_bucket resource

shaiss avatar

@Andriy Knysh (Cloud Posse) I assume the role w/ both TF and CLI, and CLI works, TF fails

shaiss avatar

@loren is on the right path here.

shaiss avatar

it’s those additional things that TF is doing that in this case fails b/c the customer insists on having that IAM policy attached to ALL roles

loren avatar

i can’t really imagine why they’d want to restrict s3:GetBucketWebsite on all buckets, that just means they can’t even confirm that the buckets do not have a website configured, as you’re seeing rofl

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yea agree, that permission should be lifted since it’s just read-only anyway

shaiss avatar

@loren I agree, but atm they won’t budge, so before I argue that point, I want to make sure there’s no other Terraform way around this

loren avatar

looking at the TF code, i don’t see a way. TF needs it to execute its “read” operation on the bucket

loren avatar

and without supporting the “read” operation, there isn’t much point in using TF

shaiss avatar

maybe I just need to fork it and remove that

shaiss avatar

I’ll call it shaiform

loren avatar

lulz

loren avatar

from the TF code, it does look like the bucket should have been created… it would be after that when TF attempts the read operation that fails… can you double-check that maybe?

shaiss avatar

it does indeed create the bucket

shaiss avatar

but the customer would still say the terraform code is invalid because of that error

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

after that you ask them to remove s3:GetBucketWebsite

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it’s not a big deal and not a security concern

shaiss avatar

man I know!

shaiss avatar

it’s a pain atm and just trying to submit clean code without errors

loren avatar

i mean, you could try to submit an issue asking that the TF provider be more considerate of insanely restrictive IAM policies and illogical customers

loren avatar

since the TF config doesn’t specify an s3 website config, TF could key on that absence to avoid the calls

2019-04-18

Maxim Tishchenko avatar
Maxim Tishchenko

guys, is there any way to user archive_file zip with -X argument? because every time when I do apply, .zip change timestamp, and upload lambda function I want to stop it. and do upload when it changed only

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I know what you mean, and I don’t think it’s possible

Maxim Tishchenko avatar
Maxim Tishchenko

really ?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Not using archive file

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I saw some one write an idempotent zip generator (reddit?)

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

But I can’t find it now and forgot to star it

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Also the order of the files matters

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

It was specifically for this use case

Gabor Csikos avatar
Gabor Csikos

there are usecases and workarounds on github issues of (probably aws provider?) , they build around lifecycle { ignore_changes } feature of TF

Maxim Tishchenko avatar
Maxim Tishchenko

yes, aws provider

Maxim Tishchenko avatar
Maxim Tishchenko

@Gabor Csikos could you do me a favour and provide a link to ignore_changes feature?

Maxim Tishchenko avatar
Maxim Tishchenko
  lifecycle {
    ignore_changes = ["filename"]
  }
Maxim Tishchenko avatar
Maxim Tishchenko

I found

dalekurt avatar
dalekurt

Is anyone using the terraform-aws-eks-cluster TF module?

dalekurt avatar
dalekurt

Using the example provided, I’m having the following issue:

Error: Error running plan: 5 error(s) occurred:

* module.eks_cluster.output.eks_cluster_id: Resource 'aws_eks_cluster.default' does not have attribute 'id' for variable 'aws_eks_cluster.default.*.id'
* module.eks_cluster.output.eks_cluster_version: Resource 'aws_eks_cluster.default' does not have attribute 'version' for variable 'aws_eks_cluster.default.*.version'
* module.eks_cluster.local.certificate_authority_data_list: local.certificate_authority_data_list: Resource 'aws_eks_cluster.default' does not have attribute 'certificate_authority' for variable 'aws_eks_cluster.default.*.certificate_authority'
* module.eks_cluster.output.eks_cluster_arn: Resource 'aws_eks_cluster.default' does not have attribute 'arn' for variable 'aws_eks_cluster.default.*.arn'
* module.eks_cluster.output.eks_cluster_endpoint: Resource 'aws_eks_cluster.default' does not have attribute 'endpoint' for variable 'aws_eks_cluster.default.*.endpoint'
 
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-eks-cluster

Terraform module for provisioning an EKS cluster. Contribute to cloudposse/terraform-aws-eks-cluster development by creating an account on GitHub.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it’s tested many times, and many people have deployed EKS cluster using it

dalekurt avatar
dalekurt

@Andriy Knysh (Cloud Posse) Yes, i’m actually using that

dalekurt avatar
dalekurt

I will give another go with a clean slate.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Andriy Knysh (Cloud Posse) should we pin the AWS provider on that module?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

yea, good idea, we pin all dependencies except the provider

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

i think we need to since the provider has been breaking so much stuff

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

I’ll open PRs

johncblandii avatar
johncblandii

the provider broke stuff on us recently

johncblandii avatar
johncblandii

all things were blocked; very disappointing

johncblandii avatar
johncblandii

@dalekurt I’m using the EKS module. i haven’t seen that issue

dalekurt avatar
dalekurt

Thanks @johncblandii @Andriy Knysh (Cloud Posse) I plowed through that and now i’m solving for the following

Error: Error refreshing state: 1 error(s) occurred:

* module.eks_workers.data.aws_ami.eks_worker: 1 error(s) occurred:

* module.eks_workers.data.aws_ami.eks_worker: data.aws_ami.eks_worker: Your query returned no results. Please change your search criteria and try again.

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@dalekurt what region are you using for EKS?

dalekurt avatar
dalekurt

@Andriy Knysh (Cloud Posse) us-east-1a

johncblandii avatar
johncblandii

My filter was based on amazon-eks-node-v*

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
ArthurHlt/terraform-provider-zipper

A terraform provider to create to create a zip file from different kind of source. - ArthurHlt/terraform-provider-zipper

Gabe avatar

does anyone have experience with https://docs.geopoiesis.io?

Hello, Geopoiesis!

Turbocharging your infrastructure-as-code

Gabe avatar

looks like atlantis but seems to have a nicer interface and ability to limit user access better

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

oh right! thanks for bringing that back to my attention

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
terraform

SweetOps is a collaborative DevOps community. We welcome engineers from around the world of all skill levels, backgrounds, and experience to join us! This is the best place to talk shop, ask questions, solicit feedback, and work together as a community to build sweet infrastructure.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@antonbabenko might have some experience (by now)

antonbabenko avatar
antonbabenko

I have not looked into it since we talked about it last time. Too busy with other things. You know :)

johncblandii avatar
johncblandii

So it is a Terraform Enterprise competitor with a 100x worse name?

johncblandii avatar
johncblandii

I kid.

johncblandii avatar
johncblandii


terraforming
geo = earth, poiesis = making
“second, there is the principle of gaian geopoiesis, a global principle of self-organization, that trumps the interests of individuals and species.”

Learn something new every day; still can’t pronounce it.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Yea the name is overboard

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

That’s nice to see each stage and changes pending

loren avatar

Very cool

2019-04-19

oscarsullivan_old avatar
oscarsullivan_old

Hm might give that go. Looks easier than Atlantis at a glance

loren avatar
Announcing Terraform 0.12 Beta 2

We are pleased to announce the availability of the second beta release of HashiCorp Terraform 0.12! The 0.12 release of Terraform contains major language improvements and a host of…

nyan_parrot4
johncblandii avatar
johncblandii

uh oh….can’t wait

johncblandii avatar
johncblandii

SEARCH IN THE DOCS!! SEARCH IN THE DOCS!! SEARCH IN THE DOCS!! SEARCH IN THE DOCS!! SEARCH IN THE DOCS!! SEARCH IN THE DOCS!!

https://www.terraform.io/docs/providers/index.html

Providers - Terraform by HashiCorp

Terraform is used to create, manage, and manipulate infrastructure resources. Examples of resources include physical machines, VMs, network switches, containers, etc. Almost any infrastructure noun can be represented as a resource in Terraform.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

nice - looks like they revamped the docs

loren avatar

Google probably still faster

johncblandii avatar
johncblandii

lmbo. prob so

Joe Presley avatar
Joe Presley

What’s the recommended workflow for secrets management with terraform and the google cloud provider?

Joe Presley avatar
Joe Presley

I’m curious if there’s a non-vault way that’s as easy as the AWS’s KMS integration with terraform.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

(me too)

Joe Presley avatar
Joe Presley

I asked the same question on reddit https://www.reddit.com/r/Terraform/comments/bf2ly2/secrets_management_with_terraform_and_google/?utm_source=share&utm_medium=web2x. There have been a couple of replies. Sops is an interesting take on the problem.

2019-04-21

dalekurt avatar
dalekurt

Has anyone successfully deployed the reference-architectures? I’m currently using it for my company but I’m not getting a successful deployment. I would love some help troubleshooting this https://github.com/cloudposse/reference-architectures

cloudposse/reference-architectures

Get up and running quickly with one of our reference architecture using our fully automated cold-start process. - cloudposse/reference-architectures

foqal avatar
foqal
05:02:19 PM

@dalekurt’s question was answered by <@Foqal>

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@dalekurt best to ask in #geodesic for now

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Maybe should create dedicated channel

2019-04-22

dalekurt avatar
dalekurt

Thanks @Erik Osterman (Cloud Posse)

dalekurt avatar
dalekurt

by now you have figured out I’m using a lot of your terraform modules on numerous projects. I’m trying to get this Terraform module <https://github.com/cloudposse/terraform-aws-eks-cluster> but I’m coming up with a single error

Error: Error refreshing state: 1 error(s) occurred:

* module.eks_workers.data.aws_ami.eks_worker: 1 error(s) occurred:

* module.eks_workers.data.aws_ami.eks_worker: data.aws_ami.eks_worker: Your query returned no results. Please change your search criteria and try again.

The module

data "aws_ami" "eks_worker" {
  count = "${var.enabled == "true" && var.use_custom_image_id == "false" ? 1 : 0}"

  most_recent = true
  name_regex  = "${var.eks_worker_ami_name_regex}"

  filter {
    name   = "name"
    values = ["${var.eks_worker_ami_name_filter}"]
  }

  most_recent = true
  owners      = ["602401143452"] # Amazon
}
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@dalekurt what AWS region and what version (release) of the module are you using?

dalekurt avatar
dalekurt

@Andriy Knysh (Cloud Posse) us-east-1 and master

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

the AMI search and filter were changed in recent PRs, You can create a separate project using just the code above, and try to update eks_worker_ami_name_regex and/or eks_worker_ami_name_filter to see what’s returned. If nothing returned, then the AMI list has already been changed in AWS, try to change eks_worker_ami_name_regex to see if you can find any EKS AMIs

dalekurt avatar
dalekurt

Okay, I was on the right track for resolving this. I will try that after my stand up. Thank you very much

dalekurt avatar
dalekurt

@Andriy Knysh (Cloud Posse) Confirmed, I created a new project for the EKS cluster using the example and the result was the same. I will look into the eks_worker_ami_name_regex

dalekurt avatar
dalekurt

I defined a terraform.tfvars with

eks_worker_ami_name_filter = "amazon-eks-node-*"
eks_worker_ami_name_regex = "^amazon-eks-node-[1-9,\\.]+-v\\d{8}$"

` Which got me past that issue.

Now I get the following

------------------------------------------------------------------------

Error: Error running plan: 5 error(s) occurred:

* module.eks_cluster.output.eks_cluster_id: Resource 'aws_eks_cluster.default' does not have attribute 'id' for variable 'aws_eks_cluster.default.*.id'
* module.eks_cluster.output.eks_cluster_endpoint: Resource 'aws_eks_cluster.default' does not have attribute 'endpoint' for variable 'aws_eks_cluster.default.*.endpoint'
* module.eks_cluster.local.certificate_authority_data_list: local.certificate_authority_data_list: Resource 'aws_eks_cluster.default' does not have attribute 'certificate_authority' for variable 'aws_eks_cluster.default.*.certificate_authority'
* module.eks_cluster.output.eks_cluster_version: Resource 'aws_eks_cluster.default' does not have attribute 'version' for variable 'aws_eks_cluster.default.*.version'
* module.eks_cluster.output.eks_cluster_arn: Resource 'aws_eks_cluster.default' does not have attribute 'arn' for variable 'aws_eks_cluster.default.*.arn'

I have to define the certificate data for one of those errors.

Cloud Posse avatar
Cloud Posse
04:02:26 PM

Join us for “Office Hours” every Wednesday 11:30AM (PST, GMT-7).

This is an opportunity to ask us questions on terraform and get to know others in the community on a more personal level. Next one is Mar 20, 2019 11:30AM.
Add it to your calendar
zoom https://zoom.us/j/684901853
slack #office-hours (our channel)

2019-04-23

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

guys, quick question

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

in the module terraform-terrafom-label there is a “local.enabled == true ? … ” isn’t it redundant and could be just defined as “local.enabled ? …” ?

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

I mean, is there a specific reason why that is written that way?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

no specific reason, could be written both ways

AgustínGonzalezNicolini avatar
AgustínGonzalezNicolini

thanks!

pericdaniel avatar
pericdaniel

Is there an example out there of how to do a list of ports with aws terraform security groups?

Tim Malone avatar
Tim Malone

If they’re all in order, you could just do a range - from and to. Otherwise, I’d probably put them into a local variable as a list and build the rules from that with count.

Tim Malone avatar
Tim Malone

Something like:

locals {
  ports = [80, 443]
}

resource “aws_security_group_rule” “main” {
  count = “${length(local.ports)}”
  ...
  from = “${local.ports[count.index]}”
  ...
}
pericdaniel avatar
pericdaniel

Awesome!

pericdaniel avatar
pericdaniel

Also, I’m trying to create generic automation builds… Is there a way to somthing like this: If a user has a subnet they want the instance in then they can input that subnet else create a subnet to put the instance in but dont create a subnet if they do put a subnet in…

Tim Malone avatar
Tim Malone

you could create a variable that defaults to an empty string and then use count = "${var.subnet = "" ? 1 : 0}" on your subnet resource to only create it if the variable is blank

pericdaniel avatar
pericdaniel

How would you get resources to select whichever one had a value?

Tim Malone avatar
Tim Malone

use a similar conditional

Tim Malone avatar
Tim Malone

subnet = "${var.subnet = "" ? ..... : var.subnet}"

pericdaniel avatar
pericdaniel

Would it be:

subnet = “${var.subnet = “” ? ….. : data.subnet}”

Tim Malone avatar
Tim Malone

the ...... i left for you to fill in, but data.subnet wouldn’t be a valid address - if you’re pulling the subnet in through a data source it would be something like data.aws_subnet.selected.subnet_id

pericdaniel avatar
pericdaniel

subnet = “${var.subnet = “” ? : data.aws_subnet.selected.subnet_id”

So like that^ Sorry trying to learn this piece of it

Tim Malone avatar
Tim Malone

subnet = "${var.subnet = "" ? data.aws_subnet.selected.subnet_id : var.subnet"

2019-04-24

Stephen Lawrence avatar
Stephen Lawrence

Utilizing the VPC Peering module. I am getting this regardless if I use VPCID’s or VPC Tags for the selector: data.aws_vpc.requestor: multiple VPCs matched; use additional constraints to reduce matches to a single VPC

Stephen Lawrence avatar
Stephen Lawrence

Each of my VPC’s are uniquely named and have unique vpc ID’s obviously.

Stephen Lawrence avatar
Stephen Lawrence

Ah, nevermind. I had two blocks of VPC peering module in my main.tf.

pericdaniel avatar
pericdaniel

Can you iterate over nested blocks in Terraform?

2019-04-25

Nikola Velkovski avatar
Nikola Velkovski

just found a weird behavior in terraform

Nikola Velkovski avatar
Nikola Velkovski
locals {
  tasks = {
    main_num  = 200
    other_num = "${local.tasks["main_num"] + (local.tasks["main_num"] * 0.50)}"
  }
}

output "other_num" {
  value = "${local.tasks["other_num"]}"
}

output "main_num" {
  value = "${local.tasks["main_num"]}"
}
Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

we recently got a lot of issues with TF maps. Work in some cases, in other don’t (mostly don’t work across many modules). And we’ve seen issue where a map gets sent b/w modules, but arrives empty or broken

Nikola Velkovski avatar
Nikola Velkovski

well can’t wait for 0.12 they should’ve tackled all of these issues.

Nikola Velkovski avatar
Nikola Velkovski

this empties the whole tasks map!

ankur.gurha avatar
ankur.gurha

Can someone point me to sample terraform project which pulls a docker image from dockerhub and deploys into ecs ?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

it deploys an app into ECS

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-aws-ecs-web-app

Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more. - cloudposse/terraform-aws-ecs-web-app

Jan avatar
cloudposse/terraform-aws-vpc-peering-multi-account

Terraform module to provision a VPC peering across multiple VPCs in different accounts by using multiple providers - cloudposse/terraform-aws-vpc-peering-multi-account

Jan avatar

I can use it perfectly fine via the geodesic images but struggling via a jenkins pipeline

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

hey @Jan, we deployed it to a client recently

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)
cloudposse/terraform-root-modules

Example Terraform service catalog of “root module” blueprints for provisioning reference architectures - cloudposse/terraform-root-modules

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Jan it needs to be able to assume role into multiple accounts

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Does Jenkins have that permission?

Jan avatar

As far as I am aware yes, I am debugging further. Whats interesting is that terraform errors out about not having credentials for the providers (running the same module with the same tfvars just as the reference./geodesic admin user it works)

Vidhi Virmani avatar
Vidhi Virmani

Can anyone help me understand this error

 kubernetes_service_account.tiller: 1 error(s) occurred:

* kubernetes_service_account.tiller: Post <http://localhost/api/v1/namespaces/kube-system/serviceaccounts>: dial tcp [::1]:80: connect: connection refused
Tim Malone avatar
Tim Malone

sounds like your k8s cluster API isn’t accessible

Tim Malone avatar
Tim Malone

you’re running it locally, right? is it definitely up, etc.?

Vidhi Virmani avatar
Vidhi Virmani

no running through terraform enterprise.

Vidhi Virmani avatar
Vidhi Virmani

maybe i need to set kubernetes provider. I am only relying on helm kubernetes config

Tim Malone avatar
Tim Malone

yeah it looks like it’s trying to connect to a local cluster, which won’t work in enterprise you’ll need to set the host and access details for the kubernetes provider

Vidhi Virmani avatar
Vidhi Virmani

Thanks @Tim Malone it works now.

1

2019-04-26

Abel Luck avatar
Abel Luck

I want to set a local value in terraform, the value should be the value from a data provider, if the value exists, otherwise a value from a variable.. anyone know if this is possible?

Abel Luck avatar
Abel Luck

in psuedo non-hcl code: local foobar = data.something.foobar != null ? data.something.foobar : var.default_foobar

Abel Luck avatar
Abel Luck

hm i suppose a ternary might work in the interpolation?

Nikola Velkovski avatar
Nikola Velkovski

@Abel Luck why not ?

Nikola Velkovski avatar
Nikola Velkovski
data "aws_ami" "test" {
  most_recent = true

  filter {
    name   = "name"
    values = ["Deep Learning AMI (Ubuntu)*"]
  }

  owners = [
    "amazon",
  ]
}

locals {
  abel = "${data.aws_ami.test.id != "" ? data.aws_ami.test.id : "bar"}"
}

output "abel" {
  value = "${local.abel}"
}
Nikola Velkovski avatar
Nikola Velkovski

although the data.aws_ami resource is a poor example since it fails when not being able to match any amis but the logic is the same with whatever you are using.

2019-04-29

Cloud Posse avatar
Cloud Posse
04:04:23 PM

Join us for “Office Hours” every Wednesday 11:30AM (PST, GMT-7).

This is an opportunity to ask us questions on terraform and get to know others in the community on a more personal level. Next one is Mar 20, 2019 11:30AM.
Add it to your calendar
zoom https://zoom.us/j/684901853
slack #office-hours (our channel)

Julio Tain Sueiras avatar
Julio Tain Sueiras

@Andriy Knysh (Cloud Posse) hi?

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

Hi @Julio Tain Sueiras

Julio Tain Sueiras avatar
Julio Tain Sueiras

so , I have officially started on the LSP implementation for terraform

Julio Tain Sueiras avatar
Julio Tain Sueiras

and from what I am seeing so far, once I have the base configs for parsing done, the completion will be reading for not just resources but for any user defined object variable

1
Julio Tain Sueiras avatar
Julio Tain Sueiras

so is going to be a very interesting approach

Julio Tain Sueiras avatar
Julio Tain Sueiras

got somestuff working

Julio Tain Sueiras avatar
Julio Tain Sueiras

it will be hcl2 parser inside the terraform to parse the source code, then adapt tfschema to use go-plugin grpc to call the provider binary directly to get the schema

Julio Tain Sueiras avatar
Julio Tain Sueiras

since terraform have split the providers

2019-04-30

cabrinha avatar
cabrinha

what do we all think of modules containing A LOT of data lookups? we have our own module, called “aws”, and this module … we’re thinking about putting a ton of data lookups we use all the time but, seems that whenever we call the module, all the data lookups get evaluated

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

We’ve done this before and it “works” however it totally breaks cold-starts

cabrinha avatar
cabrinha

friend of mine saying it’ll end up beating up the aws api

cabrinha avatar
cabrinha

i thought there was a way to have data lookups evaluated only when you use them

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

@cabrinha if data sources are in the code, they will be evaluated with terraform plan (and apply of cause)

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

you can use count in data sources if you want to disable them https://www.terraform.io/docs/configuration/data-sources.html#multiple-resource-instances

Data Sources - Configuration Language - Terraform by HashiCorp

Data sources allow data to be fetched or computed for use elsewhere in Terraform configuration.

cabrinha avatar
cabrinha

thanks

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

generally it works ok when everything is already created and in good state

Andriy Knysh (Cloud Posse) avatar
Andriy Knysh (Cloud Posse)

issues could arise during cold start (as @Erik Osterman (Cloud Posse) mentioned) and with terraform destroy

tchia04 avatar
tchia04

What are the pros and cons of using data lookup vs remote state file ?

tchia04 avatar
tchia04

If in an large organization where different group does different part and the remote state file is not accessible the I would say use data lookup. But if the same time that does all the setup then is it better to use either data lookup or remote state file ?

    keyboard_arrow_up