Releases: cloudposse/terraform-aws-eks-cluster
v2.2.0 KMS key for logs, timeout on wait for cluster
PR #150
- Allow user to specify KMS Key to use to encrypt Cloudwatch logs, closes #152
- Add timeout to default
wait_for_cluster_command
, supersedes #145, closes #146 - Additional checks for valid EKS endpoint, fixes #143, fixes #144
- Change all references to
git.io/build-harness
intocloudposse.tools/build-harness
, sincegit.io
redirects will stop working on April 29th, 2022. - Update migration docs to refer to v1 and v2 as we switch to production SemVer
v2.1.0 Output cloudwatch log group name
v0.46.0 Output cloudwatch log group name
v2.0.0 use new security-group module
This release is identical to version 0.45.0 and is just a renumbering to provide production-level semantic versioning. No migration is needed from v0.45.0 or later.
Version 2.0 includes updates to use our new security group module, which is a breaking change. See the V1 to V2 migration documentation for details on how to safely migrate.
v0.45.0
Update Security Group @aknysh (#141)
what
- Update Security Group
why
-
This module creates an EKS cluster, which automatically creates an EKS-managed Security Group in which all managed nodes are placed automatically by EKS, and unmanaged nodes could be placed
by the user, to ensure the nodes and control plane can communicate. -
Before version
0.45.0
, this module, by default, created an additional Security Group. Prior to version0.19.0
of this module, that additional Security Group was the only one exposed by
this module (because EKS at the time did not create the managed Security Group for the cluster), and it was intended that all worker nodes (managed and unmanaged) be placed in this
additional Security Group. With version0.19.0
, this module exposed the managed Security Group created by the EKS cluster, in which all managed node groups are placed by default. We now
recommend placing non-managed node groups in the EKS-created Security Group as well by using theallowed_security_group_ids
variable, and not create an additional Security Group.
references
related
v0.44.1
🚀 Enhancements
Update to use the Security Group module @aknysh (#138)
what
- Update to use the Security Group module
- Add migration doc
- Update README and GitHub workflows
why
- Standardize on using https://github.com/cloudposse/terraform-aws-security-group in all modules
- Keep up to date
- Cleanup
v1.0.0 Initial release with production Semantic Versioning
This 1.0.0 release is identical to v0.44.0 and is simply a conversion to production Semantic Versioning. If you are already using a later pre-1.0 version, do not migrate to this version, migrate directly to v2.0.0 or later/
This is the first (oldest code) release with production Semantic Versioning, part of Cloud Posse's general policy to convert to production versioning as we make updates to relatively mature modules, especially those where we see breaking changes coming in the near future. This module already has a Version 2.0 with breaking changes.
v0.44.0
🚀 Enhancements
Add `service_ipv4_cidr` option (#137)
what
- Hide
KUBECONFIG
when not in use - Combine service role IAM policies into single managed policy
- Add
service_ipv4_cidr
option
why
🐛 Bug Fixes
v0.43.4
v0.43.3
Note: This release introduced a bug in setting the IAM policy for the service role. Update to 0.44.0 or roll back to 0.43.2.
🚀 Enhancements
Prevent creating log group by the iam role @nitrocode (#132)
what
- Prevent creating log group by the iam role
why
See: hashicorp/terraform#14750, terraform-aws-modules/terraform-aws-eks#920
This is happening because EKS Cluster gets destroyed after Terraform delete the Cloudwatch Log Group. The AmazonEKSServicePolicy IAM policy (that is assigned to EKS Cluster role by default within this module) has permissions to CreateLogGroup and anything else needed to continue to logging correctly. When the Terraform destroys the Cloudwatch Log Group, the EKS Cluster that is running create it again. Then, when you run Terraform Apply again, the Cloudwatch Log Group doesn't exist in your state anymore (because the Terraform actually destroyed it) and the Terraform doesn't know this resource created outside him. terraform-aws-modules/terraform-aws-eks/issues/920
references
- Closes #67
- Original fix terraform-aws-modules/terraform-aws-eks#1594 thanks to @haarchri and thanks to @Nuru for pointing out the fix