Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terraform example improvements #187

Closed
9 tasks
ag-adampike opened this issue Apr 29, 2022 · 6 comments
Closed
9 tasks

Terraform example improvements #187

ag-adampike opened this issue Apr 29, 2022 · 6 comments
Assignees
Labels
enhancement New feature or request

Comments

@ag-adampike
Copy link
Member

This issue is to track a few fairly minor issues with our AWS Terraform deployment example:

Some nice-to-haves, possibly for future work:

  • Modularize the deployment to enable different sets of AWS credentials for certain resources (for example, if a separate account is required to manage Route53).
  • Gracefully handle TLS cert management for customers using something other than Route53. Currently the plan fails to apply until ACM validates the external domain.
  • We may be able to optionally create the necessary VPCs and subnets instead of choosing between using the default VPC or specifying an existing VPC. In my experience working directly with customers, subnets are often created specifically for the SCIM bridge anyway. If the script can automate that work as well, all the better.
@ag-adampike ag-adampike self-assigned this May 27, 2022
@pingping95
Copy link

I agree with him. AWS Terraform Example is so poor and need to upgrade.

@ag-adampike ag-adampike added the enhancement New feature or request label Sep 27, 2023
@mikedowler
Copy link

We seem to be hitting the first issue listed here - we get the following error:

creating ELBv2 application Load Balancer (xxx-alb): ValidationError: At least two subnets in two different Availability Zones must be specified

How do we go about specifying subnets - there doesn't seem to be anywhere to provide this information?
Also, some guidance on creating a dedicated VPC and subnets would be great.

The example seems to assume a lot of knowledge of AWS and Terraform, which is not necessarily the case for a 1Password/IAM admin.

@ag-adampike
Copy link
Member Author

ag-adampike commented Mar 8, 2024

Hey @mikedowler. I'm sorry I missed your comment here.

For using an existing, non-default VPC, you can specify the subnets to use by tagging them with a key of SubnetTier and a value of public. This line in the Terraform script selects the subnets with this tag:

# Find the public subnets in the VPC, or if the default VPC, use both
tags = var.vpc_name != "" ? { SubnetTier = "public" } : {}

You might also consider using our CloudFormation template which requires no interaction with Terraform, can be deployed using the console, and creates a dedicated VPC and subnets for you:
https://github.com/1Password/scim-examples/tree/main/beta/aws-ecsfargate-cfn

@PeterBocan
Copy link

Hey!

I think the steps outlined here are missing some crucial step(s), namely, is this an official module to install?

https://github.com/1Password/scim-examples/blob/main/aws-ecsfargate-terraform/README.md

@scottisloud
Copy link
Collaborator

scottisloud commented Apr 4, 2024

Hi Peter, the only dependencies here are Terraform/Terraform CLI, and the official AWS Terraform provider.

But let me know if I'm not interpreting your question correctly!

@PeterBocan
Copy link

Hey Scott, thanks for the reply.

I think this deserves a terraform module in the terraform registry. Makes things easier for me and (admittedly) I am not a big fan of copying terraform files from repos 😅 which may change.

It's very much done with some tweaks and separating the whole Google Workspace stuff out.

@ag-adampike ag-adampike closed this as not planned Won't fix, can't repro, duplicate, stale Jul 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

5 participants