Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature request: default_egress rules to security groups #38

Closed
tokiwong opened this issue Apr 30, 2019 · 5 comments · Fixed by #249
Closed

feature request: default_egress rules to security groups #38

tokiwong opened this issue Apr 30, 2019 · 5 comments · Fixed by #249

Comments

@tokiwong
Copy link

I have a use case that involves outgoing connections from the aurora rds cluster

I propose an additional resource to main.tf like so:

resource "aws_security_group_rule" "default_egress" {
  count = "${var.allowed_security_groups_count}"

  type                     = "egress"
  from_port                = "${aws_rds_cluster.this.port}"
  to_port                  = "${aws_rds_cluster.this.port}"
  protocol                 = "tcp"
  source_security_group_id = "${element(var.allowed_security_groups, count.index)}"
  security_group_id        = "${aws_security_group.this.id}"
}
@bryantbiggs
Copy link
Member

hi @tokiwong - because the cluster itself does not initiate outbound connections on its own I would lean towards this addition not fitting well with the module

@ppihus
Copy link

ppihus commented May 20, 2021

I'd like to open this again.
There can be a need for egress in case of database replication tasks. In that case, the database does initiate outbound connections.

@kpbll
Copy link

kpbll commented Oct 21, 2021

Hi! Also it would be useful for using the SG to put into it RDS proxies ...

@gowthamakanthan
Copy link

I'd like to open this again. There can be a need for egress in case of database replication tasks. In that case, the database does initiate outbound connections.

I agree with @ppihus, We need to have egress for the replication. Could someone please check?

@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Apr 14, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
5 participants