Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Releases: hashicorp/terraform-aws-consul

v0.7.5

13 Jul 11:22
235ac39
Compare
Choose a tag to compare

Modules affected

  • consul-cluster

Description

  • The consul-cluster now allows you to enable scale-in protection using the protect_from_scale_in input variable.

Special thanks

Related links

v0.7.4

20 Jan 14:55
5a02d05
Compare
Choose a tag to compare

Modules affected

  • (none)

Description

  • Fix a few broken links in the READMEs

Related links

v0.7.3

30 Jul 13:48
6d8c276
Compare
Choose a tag to compare

Modules affected

  • run-consul

Description

  • After #146 , systemd now waits for consul's notification of having joined the cluster before signaling that the service is alive. This however may occasionally result in larger waiting times and intermittent timeout failures. As a remedy, this release raises the systemd service timeout from 90s (the default) to a more reasonable 300s.

Related links

v0.7.2

22 Jul 13:39
c94590a
Compare
Choose a tag to compare

Modules affected

  • install-consul
  • setup-systemd-resolved [NEW MODULE]

Description

  • This repo now works with Ubuntu 18.04.
  • Added a new module called setup-systemd-resolved that can be used on Ubuntu 18.04 instead of dnsmasq for configuring systemd-resolved to forward requests for a specific domain to Consul.

Special thanks

  • Thank you to @sharmaanshul21 for the PR!

Related links

v0.7.1

11 Jul 03:54
e6d30c8
Compare
Choose a tag to compare

Modules affected

  • run-consul

Description

  • Add Type=notify to systemd config for Consul so that any other systemd services that depend on Consul (e.g., via Requires=consul.service) will be started after Consul is fully up and running, rather than as soon as the Consul task is started.

Special thanks

Related links

v0.7.0

25 Jun 16:05
5a5ef5a
Compare
Choose a tag to compare

Modules affected

  • consul-cluster [BACKWARDS INCOMPATIBLE]
  • consul-iam-policies [BACKWARDS INCOMPATIBLE]
  • consul-client-security-group-rules [BACKWARDS INCOMPATIBLE]
  • consul-security-group-rules [BACKWARDS INCOMPATIBLE]

Description

All the modules are now terraform 0.12.0 compatible. Note that this means the modules are no longer compatible with terraform 0.11 and under. Starting this release, you must use terraform 0.12.0 or greater to use this module.

All the module variables have been updated to use concrete types based on the new type system introduced in terraform 0.12.0. You can learn more about the types in the official documentation.

Note that as part of this, we switched to using null to indicate unset values when passing them through to resources. If you were previously using a 0 value ("" for strings and 0 for numbers), review the module variables.tf file to double check if the 0 value has been converted to a null.

Related links

v0.6.1

06 May 11:50
3d5ab84
Compare
Choose a tag to compare

Modules affected

  • run-consul

Description

  • Fix a bug where we were not registering Consul properly in systemd, so it would not automatically start after a reboot.

Related links

v0.6.0

03 Apr 20:11
91b6e97
Compare
Choose a tag to compare

Modules affected

  • install-consul [BREAKING CHANGE]
  • run-consul [BREAKING CHANGE]

Description

  • We have switched this Consul repo to use systemd instead of supervisord as a process supervisor, as systemd is now available on most major Linux distributions by default. You will need to build a new AMI with the new version of install-consul and run it with the new version of run-consul for this change to take affect. Also, take note that the run-consul script no longer exposes a --log-dir parameter; this has been replaced by --systemd-stdout and --systemd-stderr params (the default is to write logs to journalctl).

Related links

v0.5.0

31 Jan 00:39
25b86e5
Compare
Choose a tag to compare

Modules affected

  • consul-cluster [BREAKING CHANGE]

Description

  • Work around for a Terraform limitation that would cause errors if the allowed_ssh_security_group_count parameter referenced any resources, as the consul-cluster module was using that variable in a count parameter. The only available option is that you now MUST pass in a redundant variable called allowed_ssh_security_group_count that specifies the number of security group IDs in allowed_ssh_security_group_count.

Related links

v0.4.5

22 Jan 19:46
d681333
Compare
Choose a tag to compare

Modules affected

  • consul-cluster
  • run-consul

Description

  • consul-cluster now allows to make the iam setup optional and receive a role created externally.
  • run-consul now configures autorestart with unexpected so attempts to shutdown gracefully won't automatically reboot consul.

Related links