Skip to content

Releases: cloudposse/terraform-aws-elasticsearch

0.5.0 Allow use of multiple availability zones

28 Jul 22:27
Compare
Choose a tag to compare

what

  • Allow use of multiple availability zones

why

0.4.0 Convert to TF 0.12. Add tests. Add Codefresh test pipeline

08 Jul 19:06
5edffee
Compare
Choose a tag to compare

what

  • Port module to Terraform 0.12
  • Pin all providers
  • Add example for testing
  • Add bats and terratest for the example
  • Add Codefresh badge to point to the test pipeline in terraform-modules project
  • Update README

why

  • Module currently does not work with 0.12. Much easier syntax
  • Better regression control
  • Automatically test the example on every commit and pull request
  • Provision resources on AWS in the test account and check the outputs for the correct values
  • terraform-modules project contains pipelines for all terraform modules

0.3.0

14 May 22:01
529d5c7
Compare
Choose a tag to compare
Add IAM role for access to ES (#16)

0.2.0: Support the node-to-node encryption feature (#12)

06 Dec 18:56
Compare
Choose a tag to compare
* support the node-to-node encryption feature

* ran terraform fmt and rebuilt README.md with make

0.1.5: Fix ports openes (#11)

08 Oct 20:55
d618284
Compare
Choose a tag to compare

What

  • Fix security group access

Why

0.1.4

04 Oct 15:35
Compare
Choose a tag to compare

What

  • All available log options are individually configurable and can be enabled or disabled (default)
  • The CloudWatch log group ARN can be reused for each logging type or a separate one can be used

Why

  • To be able to choose any/all or none logging type instead of being bound to only one

0.1.3 Fix ingress securty group bug

03 Oct 15:33
4eb9a7d
Compare
Choose a tag to compare

What

  • Fix error
* aws_security_group_rule.ingress_security_groups: Error updating security group sg-028042200cf49ff7d rule description: InvalidParameterValue: When protocol is ALL, you cannot specify from-port.
        status code: 400, request id: d6784da7-a7c8-4748-bdc2-ae44226ba382

How

  • Make only tcp protocol opened

Why

  • To fix error

0.1.2

20 Sep 15:32
2a3759a
Compare
Choose a tag to compare

what

  • Make aws_iam_service_linked_role optional

why

  • Unable to create cluster if Service-Linked Role already exists
  • closes #5

0.1.1

26 Jul 01:46
8af0604
Compare
Choose a tag to compare

what

  • Fix aws_security_group_rule
  • Add aws_iam_service_linked_role

why

  • count was calculated incorrectly when var.allowed_cidr_blocks was empty
  • To add AWSServiceRoleForAmazonElasticsearchService role before provisioning Elasticsearch domain

references

0.1.0

24 Jul 03:13
141a17b
Compare
Choose a tag to compare

what

  • Terraform module to provision an Elasticsearch cluster in a VPC with build-in Kibana and Logstash

why

  • Easily provision Elasticsearch cluster with the specified node count in the provided subnets in a VPC
  • Provision Elasticsearch domain policy that accepts a list of IAM role ARNs from which to permit management traffic to the cluster
  • Provision Security Group to control access to the Elasticsearch domain (inputs to the Security Group are other Security Groups or CIDRs blocks to be allowed to connect to the cluster)
  • Provision DNS hostname record for Elasticsearch cluster
  • DNS hostname record for Kibana