-
-
Notifications
You must be signed in to change notification settings - Fork 109
Feat: Use Security Group Module; Restrict MSK Ingress Based on Enabled Protocols #44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/test all |
bd52042 to
dba04fc
Compare
|
/test all |
1 similar comment
|
/test all |
501eb19 to
df562b9
Compare
|
/test all |
…rraform-aws-msk-apache-kafka-cluster into feat/security-group-module
|
/test all |
| variable "security_group_create_before_destroy" { | ||
| type = bool | ||
|
|
||
| default = false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should default to true. Only default to false if it would successfully allow a non-breaking upgrade. In this case, default to true and if needed (which it probably is), add an explicit instruction to set it to false in the migration document.
| default = false | |
| default = true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Nuru I was basing this on the instructions here:
If the resource has to be deleted to change its security group,
then set the default tofalseand highlight the option to change
it totruein the release notes and migration documents.
Co-authored-by: Nuru <[email protected]>
This Pull Request has been updated, so we're dismissing all reviews.
f56a83b to
1c5e101
Compare
…rraform-aws-msk-apache-kafka-cluster into feat/security-group-module
|
/test all |
|
/test all |
what
why
var.associated_security_group_idswhich allows additional security groups to be associated with the MSK brokers, removing the need forvar.broker_node_security_groups, hence why Feat: Add Broker Node Security Groups #41 is superseded by this PR.references
security_groupsis not being utilized #5