From b1ef1f3453f97b23bc806f5c68e89cabf9a06331 Mon Sep 17 00:00:00 2001 From: colmsnowplow Date: Tue, 16 Jan 2024 16:10:11 +0000 Subject: [PATCH] Remove postgres_db_publicly_accessible tfvar from secure file (close #86) --- terraform/aws/pipeline/secure/terraform.tfvars | 1 - 1 file changed, 1 deletion(-) diff --git a/terraform/aws/pipeline/secure/terraform.tfvars b/terraform/aws/pipeline/secure/terraform.tfvars index 3811158..5955033 100644 --- a/terraform/aws/pipeline/secure/terraform.tfvars +++ b/terraform/aws/pipeline/secure/terraform.tfvars @@ -54,7 +54,6 @@ postgres_db_password = "Hell0W0rld!2" # IP ranges that you want to query the Pipeline Postgres RDS from # Note: this exposes your data to the internet - take care to ensure your allowlist is strict enough # or provide a way to access the database through the VPC instead -postgres_db_publicly_accessible = true postgres_db_ip_allowlist = ["999.999.999.999/32", "888.888.888.888/32"] # --- Target: Snowflake