-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Self-referential Resource (this) #219
Comments
Bit convoluted but a work around. Create two SG's, Assign an ingress rule of Assign an ingress rule of Assign both You can obviously add any more specific ingress rules to either gist of the plan I used here: |
This might be a dup, but I can't find it right now. I think the solution we discussed that is the lowest touch for now is to introduce a 2nd resource In the future, I've discussed ways of allowing self references that work, but it would be a pretty large change we don't want to pursue right now. @gibsop1's workaround works, too. |
The second resource makes sense to me, and seems to follow the API more closely in that ingress rules are separate things that depend on one or more security groups. For now the workaround should be fine; thanks all! |
Dupe of #167. |
I think someone should change the title of this ticket to reflect the fact that it's more general then what the title states right now. |
@errordeveloper I changed this to reflect us being aware of this use case for future searchers, but we don't have immediate plans to add it. (see also #167 (comment)). #28 now has a "break-out security group ingress rules into it's own resource" as a task, as suggested here: #28 (comment). |
This is unfortunately a big blocker for some infrastructure designs in which it's assumed that instances within the same security group can freely connect to themselves. I understand self-referential variables maybe too challenging to implement at this stage, but maybe having another parameter like:
or something similar could make this pretty extended use-case solved for now, not in the most elegant way (but way better than creating dummy security groups when AWS is perfectly capable of doing it). |
@flozano That sounds like the best approach. We're doing this now. |
👍 thanks! |
Done! |
In AWS it is possible to create a security group that has ingress rules for itself. For instance you may want to do something like this to setup an etcd cluster:
However, this causes a dependency cycle error.
Is there some other way to accomplish this?
The text was updated successfully, but these errors were encountered: