Releases: gruntwork-io/terraform-google-network
v0.9.0
Terraform 1.0 upgrade: We have verified that this repo is compatible with Terraform 1.0.x!
- From this release onward, we will only be running tests with Terraform 1.0.x against this repo, so we recommend updating to 1.0.x soon!
- To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above.
- Once all Gruntwork repos have been upgrade to work with 1.0.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
v0.8.2
v0.8.1
v0.8.0
Modules affected
bastion-hostnetwork-firewallnetwork-peeringproject-host-configurationvpc-network
Description
- Terraform 0.14 upgrade: We have verified that this repo is compatible with Terraform
0.14.x!- From this release onward, we will only be running tests with Terraform
0.14.xagainst this repo, so we recommend updating to0.14.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform
0.12.26and above, as that version has several features in it (required_providerswithsourceURLs) that make it more forwards compatible with0.14.x. - Once all Gruntwork repos have been upgrade to work with
0.14.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.7.1
Modules affected
network-firewallvpc-network
Description
This release adds two new variables: var.public_services_secondary_cidr_block and var.private_services_secondary_cidr_block that allow the public and private services secondary IP CIDR ranges to be specified manually. It is intended for backwards compatibility with existing GKE clusters to prevent changing the automatically assigned subnetwork IP ranges and recreating the clusters. Please see the migration guide in the GKE module if your upgrading to this release as it will cause existing clusters to be recreated. It also adds the new secondary IP range to the private inbound compute firewall.
Related links
v0.7.0
Modules affected
vpc-network[BACKWARDS INCOMPATIBLE]
Description
This release fixes a GKE cluster creation issue (see gruntwork-io/terraform-google-gke#118) due to a change in Google's APIs that prevents the pod secondary range name having the same name as the services secondary range name. We set defaults for the new secondary range names, however we use variables to allow backwards compatibility with existing GKE clusters. Please see the migration guide in the GKE module if your upgrading this release as it will cause existing clusters to be recreated.
Special thanks
Special thanks to @brianpham for their contributions!
Related links
v0.6.0
Modules affected
- (none)
Description
- Terraform 0.13 upgrade: We have verified that this repo is compatible with Terraform
0.13.x!- From this release onward, we will only be running tests with Terraform
0.13.xagainst this repo, so we recommend updating to0.13.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (
required_providerswithsourceURLs) that make it more forwards compatible with0.13.x. - Once all Gruntwork repos have been upgrade to work with
0.13.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.5.0
Modules affected
vpc-network[BACKWARDS INCOMPATIBLE]
Description
This release reverses a breaking change made in v0.3.0 that switched the VPC NAT routing by referencing the private subnetwork instead of the public one. With this change resources on the private subnetwork will no longer have outbound internet access unless they are assigned an external IP address.
Related links
v0.4.0
Modules affected
vpc-network[BACKWARDS INCOMPATIBLE]
Description
This release replaces the deprecated enable_flow_logs parameter from the vpc-network module in favor of the new log_config parameter. log_config supports specific additional parameters such as aggregation_internal, flow_sampling and metadata.
Migration Guide
You should remove all references to the enable_flow_logs parameter when using the vpc-network module and instead replace it with log_config. Existing networks should set log_config to the default parameters or customize them based on your needs:
log_config = {
aggregation_interval = "INTERVAL_10_MIN"
flow_sampling = 0.5
metadata = "INCLUDE_ALL_METADATA"
}
Special thanks
Special thanks to @craigedmunds and @0hlov3 for their contributions!
Related links
v0.3.0
Modules affected
vpc-network[BACKWARDS INCOMPATIBLE]
Description
This release fixes a configuration problem with the VPC NAT routing by referencing the private subnetwork instead of the public one. In theory resources on the public subnetwork should still have outbound internet connectivity, but we are still marking this as a backwards incompatible release.
Special thanks
Special thanks to @AkhilGNair for their contribution!