Skip to content

Releases: cloudposse/terraform-aws-msk-apache-kafka-cluster

v2.4.0

06 Mar 23:41
a885f49
Compare
Choose a tag to compare
Fix cluster resizes @stroobl (#103)

what

Remove ignore changes for EBS volume size, it breaks resizes.

why

Impossible to (Terraform) resize a cluster with the current code and impossible to apply Terraform after a resize in the console, even after an import of the cluster.

I know there is ongoing work in #101 that might also include a fix for this, but it looks like it will take more time to get that done. This is a basic fix.

references

AWS provider issue: hashicorp/terraform-provider-aws#26031
Cloudposse module issue: #99

v2.3.1

03 Mar 19:44
cb19d49
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/security-group/aws to v2.2.0 (main) @renovate (#88)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) module minor 2.1.0 -> 2.2.0

Release Notes

cloudposse/terraform-aws-security-group (cloudposse/security-group/aws)

v2.2.0

Compare Source

`.editorconfig` Typo @​milldr (#​50)
what

fixed intent typo

why

should be spelled "indent"

references

https://cloudposse.slack.com/archives/C01EY65H1PA/p1685638634845009

Sync github @​max-lobur (#​47)

Rebuild github dir from the template


v2.3.0

21 May 18:16
1b0169e
Compare
Choose a tag to compare
Fix `client_authentication` block. Update module versions @aknysh (#92)

what

  • Fix client_authentication block
  • Update module versions

why

  • The client_authentication block was wrong for a few reasons:

    • unauthenticated was only set if any of client_tls_auth_enabled, client_sasl_scram_enabled or client_sasl_iam_enabled was set, which is wrong
    • Having sasl block as dynamic caused MSK to recreate the cluster if any of the authentication method changed (see #91)
  • Keep up to date

references

related

v2.2.0

17 May 22:09
1a63c04
Compare
Choose a tag to compare
Fix and update variables and inputs @aknysh (#90)

what

  • Fix and update variables and inputs
  • Bump Go to 1.20 in terratest

why

  • Remove unused (deprecated) variables
  • Use all the variables that are declared
  • Add missing outputs
  • Fix output types and descriptions
  • Fix the tflint errors:
WARNING: "tflint FILE/DIR" is deprecated and will error in a future version. Use --chdir or --filter instead.
  reviewdog: input data has violations
  security-group-variables.tf:146:1: warning: variable "allow_all_egress" is declared but not used ()
  security-group-variables.tf:202:1: warning: variable "inline_rules_enabled" is declared but not used ()
  security-group-variables.tf:212:1: warning: variable "revoke_security_group_rules_on_delete" is declared but not used ()
  security-group-variables.tf:[66](https://github.com/cloudposse/terraform-aws-msk-apache-kafka-cluster/actions/runs/5006279988/jobs/8971794698#step:6:74):1: warning: variable "allowed_ipv6_cidr_blocks" is declared but not used ()
  security-group-variables.tf:75:1: warning: variable "allowed_ipv6_prefix_list_ids" is declared but not used ()
  variables-deprecated.tf:1:1: warning: variable "security_groups" is declared but not used ()
Facilitate error-free MSK upgrades @gkramer-gloat (#86)

what

This change adds support for MSK upgrades.

why

Necessary to support MSK upgrades, rather than destroying and recreating the cluster (which was previously the case).

references

Sync github @max-lobur (#89)

Rebuild github dir from the template

v2.1.0

17 May 09:10
95cbfc3
Compare
Choose a tag to compare
  • No changes

v2.0.0

09 May 15:58
95cbfc3
Compare
Choose a tag to compare
Update modules and tests. Refactor @aknysh (#85)

what

  • Update all module versions
  • Update tests
  • Fix variables and outputs names

why

  • Use the latest versions of all TF modules
  • Update the terratest to use the latest patterns
  • Keep up to date

related

v1.4.0

20 Apr 23:11
7fff9e3
Compare
Choose a tag to compare
Custom Route53 DNS hostname for MSK brokers @rooty0 (#80)

what

  • Feature: customize hostname for MSK brokers

why

  • The company where I work requires me to follow hostname standards. So we'd like to have control over DNS hostnames.

v1.3.1

20 Apr 04:10
7badeb6
Compare
Choose a tag to compare

🚀 Enhancements

Update Terraform cloudposse/route53-cluster-hostname/aws to v0.12.3 (master) @renovate (#83)

This PR contains the following updates:

Package Type Update Change
cloudposse/route53-cluster-hostname/aws (source) module patch 0.12.2 -> 0.12.3

Release Notes

cloudposse/terraform-aws-route53-cluster-hostname

v0.12.3

Compare Source

Add zone inputs, update tests, add usage @​nitrocode (#​42)

what

  • Add zone inputs, update tests, add usage

why

  • Verify zone name exists
  • Dynamically retrieve zone name based on data source inputs

references

git.io->cloudposse.tools update @​dylanbannon (#​40)

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

🤖 Automatic Updates

Update Terraform cloudposse/route53-cluster-hostname/aws to v0.12.3 (master) @renovate (#83)

This PR contains the following updates:

Package Type Update Change
cloudposse/route53-cluster-hostname/aws (source) module patch 0.12.2 -> 0.12.3

Release Notes

cloudposse/terraform-aws-route53-cluster-hostname

v0.12.3

Compare Source

Add zone inputs, update tests, add usage @​nitrocode (#​42)

what

  • Add zone inputs, update tests, add usage

why

  • Verify zone name exists
  • Dynamically retrieve zone name based on data source inputs

references

git.io->cloudposse.tools update @​dylanbannon (#​40)

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

v1.3.0

18 Apr 19:07
bf44314
Compare
Choose a tag to compare
Make scram secret assocation optional @dougbw (#78)

what

  • Make the aws_msk_scram_secret_association resource optional when sasl/scram authentication is enabled through a new variable client_sasl_scram_secret_association_enabled
  • The default behaviour is the same as before

why

  • The aws_msk_scram_secret_association resource is not very flexible and in certain use cases the preference is to manage the secret associations out of band from the cluster creation
  • In our case we need to enable sasl/scram at the point of creating the cluster of the cluster, but need to manage sasl/scram users in another tf root
  • Having aws_msk_scram_secret_association resources in separate roots creates conflicts where they will constantly overwrite each others changes

references

git.io->cloudposse.tools update @dylanbannon (#59)

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

v1.2.0

18 Apr 02:57
59c753a
Compare
Choose a tag to compare
Update splat msk cluster ebs volume size @arcaven (#81)

what

  • update splat operators
  • update aws resource syntax in msk cluster for ebs_volume_size and related aws provider versioning

why

  • post-terraform 0.12.0 splat format
  • reduce tflint, terraform validate noise
  • ebs_volume_size was deprecated from aws_msk_cluster addressing #75

references