-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Resource Identifiers and Tags for VPC Security Group Rules #20104
Comments
Adding tags to Seems like this would be an easy fix. Would love to see this get implemented (Been over a two years now!) |
@virgofx Thanks for your (and everyone else's) interest in the issue. The complexity in addressing this is best summarized in a section from an internal design document we are working on: ================ BackgroundThe In July 2021 AWS announced security group rule IDs and tags for security group rules:
The new EC2 APIs use an EC2 As there is no 1-to-1 mapping between an ================ The only solution we have come up with that does not break any existing configurations is to implement a "new" security group rule resource (with a new name) that maps 1-to-1 with the EC2 |
With #27828, planned to be released in v4.40.0 of the Terraform AWS Provider, we are adding the In the case that resource "aws_vpc" "test" {
cidr_block = "10.0.0.0/16"
}
resource "aws_security_group" "test" {
vpc_id = aws_vpc.test.id
}
resource "aws_security_group_rule" "test" {
security_group_id = aws_security_group.test.id
type = "ingress"
protocol = "tcp"
from_port = 80
to_port = 8000
cidr_blocks = ["10.0.0.0/8"]
}
resource "aws_ec2_tag" "test" {
resource_id = aws_security_group_rule.test.security_group_rule_id
key = "Name"
value = "Hello World"
} |
Is it not possible to provide an array of security rule group ids from the |
@ewbankkit - Maybe you should add your example to the documentation for aws_security_group_rule. |
What is the impact on the Or perhaps have something like #9032 (comment), but instead of specifying the rules inline, you just include a set of the ids from the new resource that replaces |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
New or Affected Resource(s)
aws_security_group
aws_security_group_rule
aws_default_security_group
Potential Terraform Configuration
References
Announcement.
Blog post.
Requires AWS SDK v1.39.2:
The text was updated successfully, but these errors were encountered: