Skip to content

Releases: MatthiasScholz/cos

v0.4.0 Nomad 1.0.2 (2021-02-13)

13 Feb 14:14
Compare
Choose a tag to compare

Overview - Nomad 1.0.2

  • Release date: 2021-02-13

Changes

  • 🎉 Upgrade of all dependencies.
  • 👷 Automation of the release process.

Incompatilbe Changes

  • Replace SSH access with AWS System Manager Session Manager (AWS SSM)
    as default configuration to access the instances in the examples folder.
    This DOES NOT decrease the functionality of the terraform modules usage itself.

Included Versions

  • nomad: 1.0.2
  • consul: 1.9.3
  • fabio: 1.5.15
  • terraform: 0.14

Terraform Modules

  • terraform-aws-nomad: 0.7.2
  • terraform-aws-consul: 0.8.4

Release Branch

  • releases/v0.4.0

Disclaimer

Do not use the out of the box configuration for your production setup
especially security and cluster access needs to be restricted better.

v0.3.0 - Upgrade to versions - Service Mesh Foundation

06 Jan 18:10
ff36b0d
Compare
Choose a tag to compare

Overview

This release is basically a software update of nomad and consul.

With the release of nomad v0.10.0 Consul Connect was further integrated into nomad. This release should provide the basis to test the service mesh functionality.

Included Versions

  • terraform: 0.12.0
  • nomad: 0.10.2
  • consul: 1.6.2
  • fabio: 1.5.13

Terraform Modules

  • terraform-aws-nomad: 0.5.0
  • terraform-aws-consul: 0.7.3

Release Branch

Disclaimer

Do not use the out of the box configuration for your production setup especially security and cluster access needs to be better restricted.

Upgrade to Terraform 0.12 + LGPL

21 Oct 21:27
Compare
Choose a tag to compare

Overview

  • Terraform 0.12. Support - Major (incompatible)

    • With #70 the cos module was upgraded to be compatible to terraform 0.12.0.
    • Furthermore the depending modules where upgraded as well:
  • License

    • With 9156e49 the license model was changed from GPL to LGPL, a more relaxed one.

Included Versions

  • terraform: 0.12.0
  • nomad: 0.9.0
  • consul: 1.4.4
  • fabio: 1.5.10

Release Branch

Conclusion

Disclaimer

Do not use the out of the box configuration for your production setup especially security and cluster access needs to be better restricted.

ALB Authentication Support

21 Jul 21:34
Compare
Choose a tag to compare

Overview

This release added more terraform output variables:

  • DNS name
  • HTTPS targetgroup ARN
  • HTTPS listener ARN

in order to support ALB Authentication configuration for the used UI ALBs:

  • nomad
  • consul
  • fabio

and just the HTTPS targetgroup ARN for the cluster data centers:

  • public, private, backoffice

Included Version

  • terraform: 0.11.14
  • nomad: 0.9.0
  • consul: 1.4.4
  • fabio: 1.5.10

Release Branch

Conclusion

Backward compatible change making only minor changes to terraform output.

DISCLAIMER

Do not use the out of the box configuration for your production setup especially security and cluster access needs to be better restricted.

Ready for use.

19 Jun 14:00
08f3c5b
Compare
Choose a tag to compare

Overview

Collection of terraform modules including working examples to set up nomad in AWS using different datacenters for separation of duties:

  • public
  • private
  • content connector
  • backoffice

Nomad cluster nodes are configured to use Docker and AWS ECR. A packer script to create an AWS AMI based on Amazon Linux 2 LTS is available.

Furthermore a collection of nomad job files to spin up some base service and some examples are available as well:

  • InCluster-Routing using fabio
  • Logging using fluentd and ElasticSearch
  • Monitoring using Prometheus and Grafana

For local development purposes there two devmode setups are for different usecases provided:

  1. nomad devmode
  2. one node local cluster

Included Versions

  • terraform: 0.11.14
  • nomad: 0.9.0
  • consul: 1.4.4
  • fabio: 1.5.10

Release Branch

Conclusion

Even though some aspects need better fine tuning the overall framework is usable and spins up a nicely configured nomad cluster in AWS.

DISCLAIMER

Do not use the out of the box configuration for your production setup especially security and cluster access needs to be better restricted.