Andriy Knysh
Andriy Knysh
@red8888 this can autoscale both tables and indexes https://github.com/cloudposse/terraform-aws-dynamodb-autoscaler https://github.com/cloudposse/terraform-aws-dynamodb-autoscaler/blob/master/main.tf#L90
/rebuild-readme
@btai24 thank you for the PR. The change looks reasonable, but if you look into the "Recommended Monitors" in the Datadog UI, they have the query in question  If...
@joroddy thanks for checking this and opening the issue. Looks like `golang.org/x/crypto version v0.0.0-20190308221718-c2843e01d9a2` is the latest version of the lib (as shown below, downloaded by `go mod tidy`. We...
@Gowiem I don't know if it's possible to do in `Go` (I guess not w/o some additional command-line flags) since atmos outputs all the messages to stdout, then calls `terraform`...
in any case (whether `terraform shell` works for you or not), we can add a flag to all atmos commands to silence it (so only the underlying tools will output...
ok, i'll think about what could be done here
@stex79 did you go through the example in https://github.com/cloudposse/terraform-aws-vpc-peering-multi-account/blob/master/README.yaml? Take a look at how to setup the role, policy and permissions. Also, these errors: ``` * module.vpc_peering_cross_account.provider.aws.accepter: The role "arn:aws:iam::YYYYYYYYYYYYY:role/cross_account_role"...
@stex79 please check the Trust Policies for both roles. Both trust Policies should allow assuming the roles from the account you are using to provision the module (it could be...
/test all