Terraform Aws Eks Cluster Versions Save

Terraform module for provisioning an EKS cluster

2.4.0

1 year ago
Custom Ingress rules @IkePCampbell (#162)

what

  • Added list of objects, which are Security Rule Ingress Definitions.

why

  • Sometimes I need to add security groups to access my EKS workers, such as other EC2 instances on a variety of ports. Same with RDS instances.

references

  • Link to any supporting github issues or helpful documentation to add some context (e.g. stackoverflow).
  • Use closes #123, if this PR closes a GitHub issue #123

2.3.2

1 year ago

🐛 Bug Fixes

Exclude only TLS provider version 4.0.0 @Nuru (#160)

what && why

references

2.3.1

1 year ago
Bump sigs.k8s.io/aws-iam-authenticator from 0.5.3 to 0.5.9 in /test/src @dependabot (#156)

Bumps sigs.k8s.io/aws-iam-authenticator from 0.5.3 to 0.5.9.

Release notes

Sourced from sigs.k8s.io/aws-iam-authenticator's releases.

v0.5.9

Changelog

  • 1209cfe2 Bump version in Makefile
  • 029d1dcf Add query parameter validation for multiple parameters

v0.5.7

What's Changed

New Contributors

Full Changelog: https://github.com/kubernetes-sigs/aws-iam-authenticator/compare/v0.5.6...v0.5.7

v0.5.6

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6-arm64
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6-amd64

v0.5.5

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)

... (truncated)

Commits
  • 1209cfe Bump version in Makefile
  • 029d1dc Add query parameter validation for multiple parameters
  • 0a72c12 Merge pull request #455 from jyotimahapatra/rev2
  • 596a043 revert use of upstream yaml parsing
  • 2a9ee95 Merge pull request #448 from jngo2/master
  • fc4e6cb Remove unused imports
  • f0fe605 Remove duplicate InitMetrics
  • 99f04d6 Merge pull request #447 from nckturner/release-0.5.6
  • 9dcb6d1 Faster multiarch docker builds
  • a9cc81b Bump timeout for image build job
  • Additional commits viewable in compare view

🐛 Bug Fixes

Disallow TLS provider v4 due to provider issue 244 @Nuru (#158)

what

  • Disallow hashicorp/tls provider version >= 4.0.0

why

When using hashicorp/tls provider v4.0.0 and setting oidc_provider_enabled = true on a new EKS cluster deployment, terraform plan will fail with thumbprint_list = [join("", data.tls_certificate.cluster.*.certficates.0.sha1_fingerprint)] and The given key does not identify an element in this collection value: the collection has no elements.

references

2.3.0

1 year ago
Add IPv6 support @Nuru (#154)

what && why

  • Add IPv6 support. Closes #142
  • Update Kubernetes exec auth API to client.authentication.k8s.io/v1beta1. Resolves #131
  • [framework] Update renovate.json to auto-close #129
Clarify cluster authentication options @Nuru (#153)

what

  • Clarify cluster authentication options

why

  • Better explanation of confusing issue

2.1.0

1 year ago

This release is identical to v0.46.0 and is just a renumbering using production semantic version rules.

Output cloudwatch log group name @woz5999 (#149)

what

  • Output cloudwatch log group name

why

  • This is helpful for passing in the log group name to other resources, e.g. datadog log forwarder

2.0.0

1 year ago

This release is identical to version 0.45.0 and is just a renumbering to provide production-level semantic versioning. No migration is needed from v0.45.0 or later.

Version 2.0 includes updates to use our new security group module, which is a breaking change. See the V1 to V2 migration documentation for details on how to safely migrate.

1.0.0

1 year ago

This 1.0.0 release is identical to v0.44.0 and is simply a conversion to production Semantic Versioning. If you are already using a later pre-1.0 version, do not migrate to this version, migrate directly to v2.0.0 or later/

This is the first (oldest code) release with production Semantic Versioning, part of Cloud Posse's general policy to convert to production versioning as we make updates to relatively mature modules, especially those where we see breaking changes coming in the near future. This module already has a Version 2.0 with breaking changes.

2.2.0

1 year ago

PR #150

  • Allow user to specify KMS Key to use to encrypt Cloudwatch logs, closes #152
  • Add timeout to default wait_for_cluster_command, supersedes #145, closes #146
  • Additional checks for valid EKS endpoint, fixes #143, fixes #144
  • Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.
  • Update migration docs to refer to v1 and v2 as we switch to production SemVer

0.46.0

2 years ago

This release has been renumbered as version 2.1.0

Output cloudwatch log group name @woz5999 (#149)

what

  • Output cloudwatch log group name

why

  • This is helpful for passing in the log group name to other resources, e.g. datadog log forwarder

0.45.0

2 years ago
Update Security Group @aknysh (#141)

what

  • Update Security Group

why

  • This module creates an EKS cluster, which automatically creates an EKS-managed Security Group in which all managed nodes are placed automatically by EKS, and unmanaged nodes could be placed by the user, to ensure the nodes and control plane can communicate.

  • Before version 0.45.0, this module, by default, created an additional Security Group. Prior to version 0.19.0 of this module, that additional Security Group was the only one exposed by this module (because EKS at the time did not create the managed Security Group for the cluster), and it was intended that all worker nodes (managed and unmanaged) be placed in this additional Security Group. With version 0.19.0, this module exposed the managed Security Group created by the EKS cluster, in which all managed node groups are placed by default. We now recommend placing non-managed node groups in the EKS-created Security Group as well by using the allowed_security_group_ids variable, and not create an additional Security Group.

references

  • Closes #140
  • Closes #139
  • Closes #80