-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS EMR resource - Support for Service Access Security Group #9600
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @ddcprg – I have a small request, can we name the field service_access_security_group_id
so that it is explicit that this value is the ID?
Sure @catsby, I'll push the change shortly |
Is this not going to cause confusion with the other properties? They all end with _group or _groups: emr_managed_master_security_group but they all are either IDs or array of IDs. I could clarify in the docs if you think that'd be better. |
This is a very good point; let's keep things consistent. Thanks! |
In v0.8.8 using next code I successfully start cluster. this was just a testing. Not sure if this is the right way? `resource "aws_emr_cluster" "hbase-cluster" { termination_protection = false ec2_attributes { tags { service_role = "${aws_iam_role.iam_emr_service_role.arn}" |
You only need |
serviceaccesssecuritygroup emr |
Can we document how to use this? I'm guessing we need to configure a new security group, to pass in here. What rules does the SG need? |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
EMR Service Access Security Group is required when a cluster is spun up on a private subnet. At the moment the EMR resource doesn't support setting this value and any attempt of spinning clusters in a private subnet will fail.