Gruntwork release 2023-02
Guides / Update Guides / Releases / 2023-02
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2023-02. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 2/22/2023 | Release notes
Published: 2/8/2023 | Release notes
Published: 2/24/2023 | Modules affected: asg-instance-refresh | Release notes
- Updates asg-instance-refresh examples to use Launch Templates instead of Launch Configurations
Published: 2/16/2023 | Modules affected: asg-rolling-deploy | Release notes
- Simplify required vars in asg-rolling-deploy
Published: 2/7/2023 | Modules affected: server-group, asg-instance-refresh, asg-rolling-deploy | Release notes
- Updates to Launch Template. Deprecate Launch Config
- Updated asg-rolling-deploy to use Launch Templates
- Deprecate launch configs in asg-instance-refresh
Published: 2/14/2023 | Modules affected: ec2-backup, ecs-deploy-runner, jenkins-server | Release notes
- Updates jenkins, ec2-backup, and the ecs-deploy-runner to use launch templates rather than the deprecated launch configurations
Published: 2/27/2023 | Modules affected: landingzone, networking | Release notes
- Updated launch configurations to launch templates
Published: 2/27/2023 | Modules affected: data-stores, landingzone, networking, observability | Release notes
- Fix changelog linter issues
- [examples] Remove deprecated argument
skip_get_ec2_platforms
from AWS …
- Remove rules from default Security Group at VPC module.
Published: 2/16/2023 | Modules affected: security, data-stores, landingzone, networking | Release notes
- Modules: remove references to Gruntwork Houston
- Add Changelogs for each module
- Add period to the RDS error message
Published: 2/1/2023 | Modules affected: data-stores | Release notes
- Updated version of the RDS module from the Service Catalog to v0.100.1.
Published: 2/27/2023 | Modules affected: lambda-cleanup-snapshots, lambda-copy-shared-snapshot, lambda-create-snapshot, lambda-share-snapshot | Release notes
- lambda-cleanup-snapshots
- lambda-copy-shared-snapshot
- lambda-create-snapshot
- lambda-share-snapshot
- aurora
- rds
- redshift
- backup-plan
- backup-vault
In this release, we have updated the aws provider version from 3.x.x to 4.22.0, which involves a major upgrade from aws provider. From testing, we didn't find any changes needed on the storage modules themselves but it might require changes on other interacting components due to the major provider version upgrade. Please test before using the newest release version.
Full Changelog: https://github.com/gruntwork-io/terraform-aws-data-storage/compare/v0.24.4...v0.26.0
Published: 2/24/2023 | Modules affected: rds, efs, aurora | Release notes
rds
efs
aurora
[BACKWARDS INCOMPATIBLE]
Full Changelog: https://github.com/gruntwork-io/terraform-aws-data-storage/compare/v0.24.3...v0.25.0
Use the terraform state mv command on any Terraform state files you have, changing your aws_security_group_rule
indexes from numbers to the source security groups' IDs.
Let's assume you have 3 entries in var.allow_connections_from_security_groups
defined in your terraform inputs,
module.database.aws_security_group_rule.allow_connections_from_security_group[0]
module.database.aws_security_group_rule.allow_connections_from_security_group[1]
module.database.aws_security_group_rule.allow_connections_from_security_group[2]
To prepare your Terraform state to be compatible with this release, you need to change the numerical index of each group to the ID of that group itself:
terraform state mv 'module.database.aws_security_group_rule.allow_connections_from_security_group[0]' 'module.database.aws_security_group_rule.allow_connections_from_security_group["sg-123abc"]'
terraform state mv 'module.database.aws_security_group_rule.allow_connections_from_security_group[1]' 'module.database.aws_security_group_rule.allow_connections_from_security_group["sg-456def"]'
...
Published: 2/17/2023 | Modules affected: aurora, backup-vault, redshift | Release notes
Published: 2/7/2023 | Modules affected: eks-container-logs | Release notes
- Expose Helm Chart
additionalInputs
value.
Published: 2/8/2023 | Release notes
Migrated the example in examples/asg-alarms to use a launch template instead of a launch configuration.
Published: 2/23/2023 | Modules affected: landingzone, data-stores, mgmt, networking | Release notes
- remove deprecated argument skip_get_ec2_platforms from AWS …
- remove references to Gruntwork Houston
- Update version of CIS Service Catalog in the RDS patch
- Add Changelogs for modules used by CIS
- Update to correct gruntwork-installer branch name
- Create example: single account Gruntwork Pipelines configuration
- [CORE-308] upgrade from launch configurations to launch templates
Published: 2/13/2023 | Modules affected: services/public-static-website, data-stores | Release notes
- Add dependency between S3 bucket and access logs bucket
- Fix duplicate S3 website routing rules and support multiple routing rules
Published: 2/10/2023 | Modules affected: services | Release notes
- Added new 'cloudwatch_log_group_tags' variable to
ecs-service
module
- Exposes
secondary_private_ips
variable in ec2-instance
module
Published: 2/10/2023 | Modules affected: services | Release notes
- Exposes variable to disable cloudfront logs on
public_static_website
module.
Published: 2/9/2023 | Modules affected: networking, services | Release notes
- Bump
terraform-aws-eks
to v0.56.3
- expose additional inputs for fluentbit in core services
- Upgrade
helm-kubernetes-services
to v0.2.18
Published: 2/2/2023 | Modules affected: networking, services | Release notes
- Adds conditional logic for writing ExecCredential api version to support backward compatibility with
terraform-aws-eks
v0.56.1 and above with EKS clusters 1.23 and below.
Published: 2/1/2023 | Modules affected: services | Release notes
- Expose
web_acl_id
in public-static-website module
Published: 2/10/2023 | Modules affected: s3-static-website | Release notes
- Fixes duplicate routing rules applied when using
routing_rule
input for the s3-static-website
module
- Adds
routing_rules
input for the s3-static-website
module. This enables having empty String values in routing rules