You can include an optionalkeyattribute. If present, its value must be unique among all security group rules in the security group, and it must be known in the Terraform "plan" phase, meaning it cannot depend on
~>NOTE on Security Groups and Security Group Rules:Terraform currently provides both a standalone Security Group Rule resource (a singleingressoregressrule), and aSecurity Group resourcewithingressandegressrules defined in-line. At this time you cannot use a Security Group with in-line rules in ...
Terraform currently provides a Security Group resource with ingress and egress rules defined in-line and a Security Group Rule resource which manages one or more ingress or egress rules. Both of these resource were added before AWS assigned a security group rule unique ID, and they do not work...
yamlhcl resource:aws_db_security_group:default:name:rds_sgingress:cidr:10.0.0.0/24 Argument Reference The following arguments are supported: name- (Required) The name of the DB security group. description- (Optional) The description of the DB security group. Defaults to “Managed by Terraform”...
id- The Redshift security group ID. Import Redshift security groups can be imported using thename, e.g. $ terraform import aws_redshift_security_group.testgroup1 redshift_test_group See the source of this document atTerraform.io Data Sources...
Each AWS VPC (or region, if using EC2 Classic) comes with a Default Security Group that cannot be deleted. Theaws_default_security_groupallows you to manage this Security Group, but Terraform cannot destroy it. Removing this resource from your configuration will remove it from your statefile ...
name– (Required) Name for the cache security group. This value is stored as a lowercase string. description– (Optional) description for the cache security group. Defaults to “Managed by Terraform”. security_group_names– (Required) List of EC2 security group names to be authorized for ingr...
Virtual AWS security groups for Terraform Easily declare complex AWS security groups for Terraform with security group inheritance/composition and more concise syntax. Overview AWS imposes a limit of 5 security groups per network interface1, which makes it difficult or impossible to have fine-grained ...
The Terraform module should include additional security group rules for node-to-node communication by default, ensuring that pods across different node groups can communicate effectively without manual configuration. Describe alternatives you've considered. ...
Steps to reproduce the behavior: module "vpc" { source = "terraform-aws-modules/vpc/aws" version = "4.0.2" name = "garbanzos-vpc" cidr = "10.0.0.0/16" azs = slice(data.aws_availability_zones.available.names, 0, 2) private_subnets = ["10.0.0.0/18", "10.0.64.0/18"] public_subne...