Skip to content
This repository was archived by the owner on May 3, 2023. It is now read-only.

Fix IAM policy error, make some stuff configurable #1

Open
wants to merge 15 commits into
base: master
Choose a base branch
from

Conversation

draoncc
Copy link

@draoncc draoncc commented Oct 12, 2020

I've found this module to be incredibly helpful but somewhat limiting with how many of the options weren't configurable. I've also run into an issue where the runner instance wasn't able to create spot requests due to ec2:AuthorizeSecurityGroupIngress missing in its IAM policy.

I'm not so sure about the default for the new variable tags. Perhaps just remove the default?

policy = data.template_file.instance_profile.rendered
name_prefix = "gitlab-runner-instance-role"
role = aws_iam_role.instance.name
policy = data.template_file.instance_profile.rendered
}

resource "aws_cloudwatch_log_group" "environment" {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This could potentially be a aws-cloudwatch-log-group-customer-key vulnerability which is of LOW severity.
Message: CloudWatch log groups should be encrypted using CMK

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant