Releases: hashicorp/terraform-aws-vault
v0.6.2
v0.6.1
v0.6.0
v0.5.2
#56: All the vault examples now use the new consul-client-security-group-rules to open up ports required for Consul clients to communicate with each other (lan gossip). We recommend you add this module to your deployments if you are using Vault with Consul.
v0.5.1
v0.5.0
#52:
BACKWARDS INCOMPATIBLE CHANGE
The vault-cluster
module no longer supports the target_group_arns
and load_balancers
parameters. Instead, to associate a load balancer with your Vault cluster, you should use a separate aws_autoscaling_attachment
resource. If you're using the vault-elb
module, it will create the aws_autoscaling_attachment
resource for you automatically.
Note that to deploy this change without downtime, you will most likely want to spin up a new Vault cluster (new ASG), using the same tags and load balancer, wait for it join the original cluster, and then tear down the old ASG.
v0.4.0
#48:
BACKWARDS INCOMPATIBLE CHANGE
The Vault ASG is now namespaced using the cluster_name
variable, just like all the other resources. Terraform treats renaming an ASG as deleting the old one and creating a new one, so be careful when updating!
Probably the best option is to:
- Add a second
vault-cluster
module to your code but with the samecluster_tag_key
andcluster_tag_value
as the first cluster. - Run
terraform apply
. - This will bring up a second ASG that should be part of the same Vault cluster as the first. Wait for all the new nodes to come up.
- SSH to each new node and run
vault unseal
. - SSH to each old node and run
vault seal
. - Remove the old
vault-cluster
module from your code. - Run
terraform apply
. - Now you're left with just the new cluster.
As always, make sure to test this in a pre-prod environment before prod!
v0.3.0
v0.2.1
v0.2.0
#41: You can now enable S3 as a storage backend again (while still using Consul as the HA backend)!
- When deploying the
vault-cluster
module, set theenable_s3_backend
param totrue
and specify the name of the S3 bucket to use via thes3_bucket_name
param. - When calling
run-vault
, set the--enable-s3-backend
param totrue
and specify the name and region of the S3 bucket to use via the--s3-bucket
and--s3-bucket-region
params.