Skip to main content

Gruntwork release 2018-07

Guides / Update Guides / Releases / 2018-07

This page is lists all the updates to the Gruntwork Infrastructure as Code Library that were released in 2018-07. For instructions on how to use these updates in your code, check out the updating documentation.

Here are the repos that were updated:

gruntwork

v0.0.21

Published: 7/13/2018 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/29: Update list of Gruntwork GitHub usernames.

v0.0.20

Published: 7/3/2018 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/28: Increase default max session duration.

terraform-aws-asg

v0.6.15

Published: 7/19/2018 | Release notes

https://github.com/gruntwork-io/module-asg/pull/41: Remove depends_on workaround in asg-rolling-deploy. This should now show the proper value for your ASG desired_capacity during plan.

v0.6.14

Published: 7/18/2018 | Release notes

https://github.com/gruntwork-io/module-asg/pull/40: You can now specify custom termination policies in the asg-rolling-deploy module using the new termination_policies input variable.

terraform-aws-elk

v0.0.8

Published: 7/31/2018 | Release notes

Documentation is still a work-in-progress. There will be a follow-up PR for that shortly.

v0.0.7

Published: 7/27/2018 | Release notes

v0.0.6

Published: 7/23/2018 | Release notes

v0.0.5

Published: 7/23/2018 | Release notes

v0.0.4

Published: 7/2/2018 | Release notes

This pre-release introduces support for forwarding Cloudwatch and Cloudtrail (S3) logs to Logstash.

PRs #25 #29

terraform-aws-openvpn

v0.7.1

Published: 7/3/2018 | Release notes

terraform-aws-security

v0.14.0

Published: 7/5/2018 | Release notes

https://github.com/gruntwork-io/module-security/pull/103:

  1. ssh-grunt now signs all requests to Houston with its AWS credentials. This is a backwards incompatible change: all ssh-grunt houston xxx commands now all take in a required --houston-region param (AWS region where Houston is deployed) and an optional --iam-role param (IAM role to assume when signing the request).

  2. Update the iam-policies and cross-account-iam-roles modules to create the IAM permissions EC2 Instances will need to make (signed) requests to Houston.

terraform-aws-zookeeper

v0.4.5

Published: 7/19/2018 | Release notes