-
-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
added vpc endpoint to access secrets manager #15
Conversation
WalkthroughThe changes primarily focus on enhancing the AWS VPC configuration by adding a new VPC endpoint for the Secrets Manager service. The region attribute is also introduced in the VPC module. The endpoint is associated with the private subnets of the VPC and a specific security group. Changes
TipsChat with CodeRabbit Bot (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Review Status
Actionable comments generated: 0
Files selected for processing (3)
- live/core/vpc.tf (1 hunks)
- modules/vpc/endpoints.tf (1 hunks)
- modules/vpc/variables.tf (1 hunks)
Files skipped from review due to trivial changes (2)
- modules/vpc/endpoints.tf
- modules/vpc/variables.tf
Additional comments (Suppressed): 1
live/core/vpc.tf (1)
- 14-14: The new attribute
region
is added to themodule "vpc"
block. Ensure that thevar.region
variable is defined and correctly set in the environment where this module is used. Also, verify that the VPC module supports this attribute.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Review Status
Actionable comments generated: 0
Files selected for processing (1)
- modules/vpc/endpoints.tf (1 hunks)
Additional comments (Suppressed): 1
modules/vpc/endpoints.tf (1)
- 1-10: The new hunk introduces a VPC endpoint for AWS Secrets Manager. It correctly uses the current region to construct the service name and associates the endpoint with the appropriate security group and private subnets. However, it's important to verify that the
module.app_security_group.security_group_id
andmodule.vpc.private_subnets
are correctly configured to allow traffic to and from the Secrets Manager endpoint. Also, ensure that the necessary IAM policies are in place to allow access to the Secrets Manager service.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🔥
@AgusPk just need to run terraform fmt in the file that is failing on CI, the rest is OK 👌🏻 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Review Status
Actionable comments generated: 0
Files selected for processing (1)
- modules/vpc/endpoints.tf (1 hunks)
Additional comments (Suppressed): 1
modules/vpc/endpoints.tf (1)
- 1-10: The new hunk introduces a VPC endpoint for AWS Secrets Manager. It uses the current region and VPC ID, and associates the endpoint with a specific security group and the private subnets of the VPC. This is a good security practice as it restricts access to the Secrets Manager to within the VPC, eliminating the need for internet-based access. However, ensure that the
module.vpc.vpc_id
,module.app_security_group.security_group_id
, andmodule.vpc.private_subnets
are correctly set and accessible in this context.
What's this PR do?
Solves #10
Summary by CodeRabbit
region
to the VPC module to specify the AWS region.