Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Releases: hashicorp/terraform-aws-vault

v0.6.2

05 May 23:32
fab4870
Compare
Choose a tag to compare

#64: Remove provider and aws_region from examples so you can use them following the instructions in the Terraform Registry.

v0.6.1

24 Apr 14:46
ce9adea
Compare
Choose a tag to compare

#62: You can now specify additional security groups to attach to the ASG in the vault-cluster module using the new additional_security_group_ids parameter.

v0.6.0

14 Apr 12:59
b274787
Compare
Choose a tag to compare

#60: Update to Vault 0.10.0. run-vault now configures api_addr instead of redirect_addr.

v0.5.2

13 Apr 10:40
16f8a6d
Compare
Choose a tag to compare

#56: All the vault examples now use the new consul-client-security-group-rules to open up ports required for Consul clients to communicate with each other (lan gossip). We recommend you add this module to your deployments if you are using Vault with Consul.

v0.5.1

09 Apr 23:28
7d18a99
Compare
Choose a tag to compare

#55: The vault-cluster module now sets a Name tag on the Launch Configuration security group.

v0.5.0

29 Mar 13:02
25b248e
Compare
Choose a tag to compare

#52:

BACKWARDS INCOMPATIBLE CHANGE

The vault-cluster module no longer supports the target_group_arns and load_balancers parameters. Instead, to associate a load balancer with your Vault cluster, you should use a separate aws_autoscaling_attachment resource. If you're using the vault-elb module, it will create the aws_autoscaling_attachment resource for you automatically.

Note that to deploy this change without downtime, you will most likely want to spin up a new Vault cluster (new ASG), using the same tags and load balancer, wait for it join the original cluster, and then tear down the old ASG.

v0.4.0

19 Mar 16:10
45a3e5b
Compare
Choose a tag to compare

#48:

BACKWARDS INCOMPATIBLE CHANGE

The Vault ASG is now namespaced using the cluster_name variable, just like all the other resources. Terraform treats renaming an ASG as deleting the old one and creating a new one, so be careful when updating!

Probably the best option is to:

  1. Add a second vault-cluster module to your code but with the same cluster_tag_key and cluster_tag_value as the first cluster.
  2. Run terraform apply.
  3. This will bring up a second ASG that should be part of the same Vault cluster as the first. Wait for all the new nodes to come up.
  4. SSH to each new node and run vault unseal.
  5. SSH to each old node and run vault seal.
  6. Remove the old vault-cluster module from your code.
  7. Run terraform apply.
  8. Now you're left with just the new cluster.

As always, make sure to test this in a pre-prod environment before prod!

v0.3.0

20 Feb 23:06
5723368
Compare
Choose a tag to compare

#44: The vault-elb module no longer exposes an availability_zones parameter. Please use subnet_ids instead.

v0.2.1

15 Feb 23:54
8d093d0
Compare
Choose a tag to compare

#43: You can now install Vault from a custom URL. This is especially useful for Vault enterprise.

v0.2.0

08 Feb 13:34
518bedb
Compare
Choose a tag to compare

#41: You can now enable S3 as a storage backend again (while still using Consul as the HA backend)!

  • When deploying the vault-cluster module, set the enable_s3_backend param to true and specify the name of the S3 bucket to use via the s3_bucket_name param.
  • When calling run-vault, set the --enable-s3-backend param to true and specify the name and region of the S3 bucket to use via the --s3-bucket and --s3-bucket-region params.