Skip to content

Conversation

@brent-anyscale
Copy link
Collaborator

This change allows for the use of either CIDR or Existing Security Group configurations for the security group ingress rules. This is useful for customers who have existing security groups they want to use to grant access to the Anyscale data plane.

This also cleans up commented-out code from older releases.

On branch brent/update-security-group-config
Changes to be committed:

  • modified: CHANGELOG.md
  • modified: README.md
  • modified: main.tf
  • modified: modules/aws-anyscale-securitygroups/examples/main.tf
  • modified: modules/aws-anyscale-securitygroups/examples/outputs.tf
  • modified: modules/aws-anyscale-securitygroups/main.tf
  • modified: modules/aws-anyscale-securitygroups/variables.tf
  • modified: variables.tf

Pull request checklist

Please check if your PR fulfills the following requirements:

  • pre-commit has been run
  • Tests for the changes have been added (for bug fixes / features)
  • All tests passing
  • Docs have been reviewed and added / updated if needed (for bug fixes / features)

Pull Request Type

  • Bugfix
  • New feature
  • Refactoring (no functional changes)
  • Documentation change
  • Other (please describe):

Does this introduce a breaking change?

  • Yes
  • No

…ting Security Group configurations.

This change allows for the use of either CIDR or Existing Security Group configurations
for the security group ingress rules. This is useful for customers who have existing
security groups they want to use to grant access to the Anyscale data plane.

This also cleans up commented-out code from older releases.

On branch brent/update-security-group-config
Changes to be committed:
	modified:   CHANGELOG.md
	modified:   README.md
	modified:   main.tf
	modified:   modules/aws-anyscale-securitygroups/examples/main.tf
	modified:   modules/aws-anyscale-securitygroups/examples/outputs.tf
	modified:   modules/aws-anyscale-securitygroups/main.tf
	modified:   modules/aws-anyscale-securitygroups/variables.tf
	modified:   variables.tf
@brent-anyscale brent-anyscale requested a review from a team as a code owner August 26, 2025 16:38
@github-actions github-actions bot added documentation Improvements or additions to documentation terraform labels Aug 26, 2025
@brent-anyscale brent-anyscale added enhancement New feature or request terraform-module-securitygroup and removed documentation Improvements or additions to documentation labels Aug 26, 2025
@brent-anyscale brent-anyscale requested a review from RCdeWit August 26, 2025 16:38
@brent-anyscale
Copy link
Collaborator Author

@RCdeWit if you have some time, can you test upgrading from a previous version to this latest one? I've done a couple of quick tests, but I could use a more thorough approach. I want to ensure that the security group doesn't get rebuilt (and thus generate a new security group ID).

@RCdeWit
Copy link

RCdeWit commented Sep 2, 2025

Deploy on main branch:

terraform output | grep security_group_id
anyscale_v2_security_group_id = "sg-012943ff7d6927a55"

Switch to dev branch and deploy again, using the try() from my suggestion above:

Apply complete! Resources: 0 added, 0 changed, 0 destroyed.

And the anyscale_v2_security_group_id remains unchanged. But I haven't tested this with an existing security group that wasn't created through the modules.

Co-authored-by: Rob de Wit <[email protected]>
@github-actions github-actions bot added the documentation Improvements or additions to documentation label Sep 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation enhancement New feature or request terraform terraform-module-securitygroup

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants