-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Transfer Server: Attach VPC security groups at creation #15788
Comments
Any update on when this will be available? |
Hi @rodrigdav, I have open a PR 17496. |
Thank you . I will keep an eye out for it.
…On Fri, Feb 5, 2021, 8:57 PM amadureira ***@***.***> wrote:
Hi @rodrigdav <https://github.com/rodrigdav>,
I have open a PR 17496
<#17496>.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#15788 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAOKMJH7HTZU2NSTA2HVAUDS5SOXPANCNFSM4S3GH3ZQ>
.
|
Hi @rodrigdav and @Zordrak, I check my PR and I found some problems. I will fix it. You could use my provider, see this configuration bellow:
|
Hi @ewbankkit , could you help-me? I closed PR 17496 because the branch's name is wrong. As mentioned on this doc, technical debt should start with tb- prefix. I fixed others mistakes at this new PR 17539 but anyone saw it. I don't know if I did something wrong. Thanks for your help. |
Any news? |
Really interested in this functionality. AWS cloudformation supports it, would love support from terraform side as well. |
Hi Guys, I've applied the @ewbankkit recommendations. I forgot to mark that is done. I do it now! |
I am starting to have some bandwidth. I can test it out here in the next
few days. Let me know how?
…On Wed, Mar 10, 2021, 7:21 PM amadureira ***@***.***> wrote:
Hi Guys,
I've applied the @ewbankkit <https://github.com/ewbankkit>
recommendations.
I forgot to mark that is done. I do it now!
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#15788 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAOKMJDHVO74RUB63TUXEQ3TDAEJJANCNFSM4S3GH3ZQ>
.
|
any update on this, i don't see this feature is yet supported, looking for some response thanks |
Can we have this released sooner? Its tweaky to update security group on endpoint without this. |
How should security groups be assigned in the meanwhile? After server creation (with the default SG), get to the VPC endpoint that was created and update the SGs there? |
Yep, that is how i do it.. i invoke a custom python script in tf to do that for me so it feels somewhat automated still :) |
When this will be available. |
@MBarendregt how do you do that? When I try creating a VPC-hosted Transfer server Terraform just hangs.
This is the config I'm trying it with:
Edit: actually, never mind. I think I have this figured out, it has to do with our VPC config. |
Hi, I'm also bocked by this feature. With this, impossible to create transfer server using shared VPC In an aws account without vpc sharing, I create a vpc endpoint, then I use VPC_ENDPOINT and attached my transfer.server endpoint |
So I did this using the null_resource and calling out to the AWS CLI to add the security groups.
Hope that helps somebody. |
Thanks , @rodrigdav we can use this workaorund but it would be interesting if resource "aws_transfer_server" could include this feature. Any news about this? Regards. |
Any news about it? |
This issue is on the current quarter's roadmap. |
This has been addressed via #17539 (thanks to @amadureira for getting the solution started) and should be available in v3.49.0 of the Terraform AWS Provider next week. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
You can now attach multiple security groups to a server in a VPC.
New or Affected Resource(s)
aws_transfer_server
Potential Terraform Configuration
References
User Guide.
Requires AWS SDK v1.35.8:
Related:
aws_vpc_endpoint_security_group_association
#13737Note:
The text was updated successfully, but these errors were encountered: