Skip to content

Commit b977bfe

Browse files
authored
fix: Route53 healthcheck all regions (#605)
Update the Route53 healthcheck to run from all AWS regions. This is being done to keep a higher number of API lambda functions warm to see if it helps with the Notify timeout errors.
1 parent 9f69126 commit b977bfe

File tree

2 files changed

+0
-73
lines changed

2 files changed

+0
-73
lines changed

terragrunt/aws/api/route53.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ resource "aws_route53_health_check" "scan_files_A" {
1717
resource_path = "/healthcheck"
1818
failure_threshold = "5"
1919
request_interval = "30"
20-
regions = ["us-east-1", "us-west-1", "us-west-2"]
2120

2221
tags = {
2322
CostCentre = var.billing_code

terragrunt/aws/api/waf.tf

Lines changed: 0 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -14,62 +14,6 @@ resource "aws_wafv2_web_acl" "api_waf" {
1414
allow {}
1515
}
1616

17-
rule {
18-
name = "IpAllowList"
19-
priority = 1
20-
21-
action {
22-
allow {}
23-
}
24-
25-
statement {
26-
ip_set_reference_statement {
27-
arn = aws_wafv2_ip_set.ip_allowlist.arn
28-
}
29-
}
30-
31-
visibility_config {
32-
cloudwatch_metrics_enabled = true
33-
metric_name = "IpAllowList"
34-
sampled_requests_enabled = true
35-
}
36-
}
37-
38-
rule {
39-
name = "NorthAmericaOnly"
40-
priority = 2
41-
42-
action {
43-
dynamic "block" {
44-
for_each = var.enable_waf == true ? [""] : []
45-
content {
46-
}
47-
}
48-
49-
dynamic "count" {
50-
for_each = var.enable_waf == false ? [""] : []
51-
content {
52-
}
53-
}
54-
}
55-
56-
statement {
57-
not_statement {
58-
statement {
59-
geo_match_statement {
60-
country_codes = ["CA", "US"]
61-
}
62-
}
63-
}
64-
}
65-
66-
visibility_config {
67-
cloudwatch_metrics_enabled = true
68-
metric_name = "NorthAmericaOnly"
69-
sampled_requests_enabled = true
70-
}
71-
}
72-
7317
rule {
7418
name = "APIInvalidPath"
7519
priority = 5
@@ -470,19 +414,3 @@ resource "aws_wafv2_web_acl_logging_configuration" "api_waf" {
470414
log_destination_configs = [aws_kinesis_firehose_delivery_stream.api_waf.arn]
471415
resource_arn = aws_wafv2_web_acl.api_waf.arn
472416
}
473-
474-
# Azure US East CIDR blocks that are being identified as being in Germany
475-
# These should be allowed.
476-
resource "aws_wafv2_ip_set" "ip_allowlist" {
477-
provider = aws.us-east-1
478-
479-
name = "ip_allowlist"
480-
scope = "CLOUDFRONT"
481-
ip_address_version = "IPV4"
482-
addresses = [
483-
"172.172.0.0/15",
484-
"172.174.0.0/16",
485-
"172.175.0.0/16",
486-
"172.176.0.0/15"
487-
]
488-
}

0 commit comments

Comments
 (0)