You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This sets the default Load Balancer policy to
ELBSecurityPolicy-TLS13-1-2-2021-06, which allows TLSv1.3 and 1.2. This
is the recommended policy. See
https://docs.aws.amazon.com/elasticloadbalancing/latest/application/describe-ssl-policies.html
for details on all the policies.
In fact, clients were still able to connect via TLSv1.3 due to changes
in the ALB applied last year. https://aws.amazon.com/about-aws/whats-new/2023/03/application-load-balancer-tls-1-3/
This policy ensures that connections between the ALB and the server is
also TLSv1.3 or 1.2. This is somewhat less important since it is all
internal to the VPC, but a good idea nonetheless.
This also updates the ALB policy when setting up pgadmin.
Finally, this exposes the security policy as a variable so it can be
overriden if needed.
Copy file name to clipboardexpand all lines: cloud/aws/bin/pgadmin.py
+1-1
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ def run(config: ConfigLoader):
27
27
28
28
url=f"{config.get_base_url()}:4433"
29
29
print(
30
-
"\npgadmin terraform deployment finished. Waiting for pgadmin to be available (some request failures are expected). Press ctlr-c to shortcut this wait and print connection information."
30
+
f"\npgadmin terraform deployment finished. Waiting for pgadmin to be available at {url}(some request failures are expected). Press Ctrl-c to shortcut this wait and print connection information."
description="The AWS security policy to use on the load balancer. https://docs.aws.amazon.com/elasticloadbalancing/latest/network/describe-ssl-policies.html"
description="The AWS security policy to use on the load balancer. https://docs.aws.amazon.com/elasticloadbalancing/latest/network/describe-ssl-policies.html"
0 commit comments