Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

InvalidParameterValue: ICMP code (65535) out of range #7

Closed
TinajaLabs opened this issue Oct 13, 2017 · 4 comments
Closed

InvalidParameterValue: ICMP code (65535) out of range #7

TinajaLabs opened this issue Oct 13, 2017 · 4 comments

Comments

@TinajaLabs
Copy link

The following definition gets me this error:

Error applying plan:

1 error(s) occurred:

* module.sg_default_iss.aws_security_group_rule.ingress_rules[1]: 1 error(s) occurred:

* aws_security_group_rule.ingress_rules.1: Error authorizing security group rule type ingress: InvalidParameterValue: ICMP code (65535) out of range
	status code: 400, request id: cfb24bd5-c5b2-447c-b3de-ad1d6a4a333b

Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.
variable "track_subnet_cidr_block" {
  default = "192.168.144.0/25"
}

module "sg_default_iss" {
  source = "../../modules/terraform-aws-security-group"

  name        = "${var.track_name}_sg"
  description = "Security Group: ${var.track_name}_sg, managed by Terraform"
  vpc_id      = "${module.vpc.vpc_id}"

  ingress_cidr_blocks = ["${var.track_subnet_cidr_block}"]
  ingress_rules       = ["ssh-tcp", "all-icmp"]
  egress_rules        = ["all-all"]

  # ingress_rules = ["ssh-tcp"]

  tags = {
    Environment = "${var.track_environment}"
    Name        = "${var.track_name}_sg"
    Desc        = "The IIS VPC for: ${var.track_name}"
    StopGroup   = "n/a"
    Track       = "${var.track_name}"
    Terraform   = "true"
  }
}

Any tips appreciated,
Chris.

@antonbabenko
Copy link
Member

Thank you for this report, I have just fixed it in eaaf5c3 (tagged v1.1.2)

@antonbabenko
Copy link
Member

Also, you don't have to copy-paste modules code, but can refer to the Terraform registry like this:

module "sg_default_iss" {
  source = "terraform-aws-modules/security-group/aws"

...
}

@TinajaLabs
Copy link
Author

Thank you, Anton.

@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 17, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants