This repository was archived by the owner on Sep 24, 2025. It is now read-only.
Added inbound cidrs for loadbalancer#28
Open
grimesjm wants to merge 1 commit into
Open
Conversation
|
I was looking at the same thing. Puzzling that the vault-lb-aws module supports this as an input variable but the vault-aws module doesn't provide a way to pass an input through to that. There is a workaround: module.vault-aws.vault_lb_sg_id is exported, and you can create a resource in your calling module to create an additional security group rule. Note this only makes sense when it's an internal load balancer. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
I ran into a limitation with using a non-public LB setup with vault. We have our network extended into AWS and want to limit the CIDR ranges that exist on that internal network that have access to the loadbalancer. This gives us an optional list we can pass into the module to add that access to that range.
I ran this against my own TF I have for provisioning a consul cluster and it updates the SG rules as I would expect.