-
-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat!: Support enabling NAU metrics in "aws_vpc" resource #838
feat!: Support enabling NAU metrics in "aws_vpc" resource #838
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks fine
Looks like 4.35.0 was just released, so this should be good to go now? |
@@ -4,7 +4,7 @@ terraform { | |||
required_providers { | |||
aws = { | |||
source = "hashicorp/aws" | |||
version = ">= 3.73" | |||
version = ">= 4.35" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is now a breaking change
What can I do to get this PR reviewed? |
This PR has been automatically marked as stale because it has been open 30 days |
@antonbabenko What can I do to get this PR reviewed? |
Any eta on this? |
Could this be updated to also support this attribute on the |
Is there any update on when this could be merged? |
apologies that this hasn't been addressed earlier. I was holding out for https://github.com/clowdhaus/terraform-aws-vpc-v4 but I have not had the time recently to dedicate to finishing and plotting the path from v3 to v4. However, I think its time we unblock some of these newer features for VPC and I will revisit the larger, architectural changes after Let me check over a few of the past issues/PRs and see what else we might want to incorporate in this breaking change. The goal will be a "light" breaking change where state moves are not required - mostly just a breaking change because the min required versions of Terraform and AWS provider have been raised and some default values changed. Once I have gone through that I'll pass it over to Anton for a final review and we should be able to get this shipped out. Thank you all for your patience! |
c8513e5
to
ce04f6b
Compare
ce04f6b
to
a8de9c5
Compare
Hi @antonbabenko, conscious you are busy but please could you review this PR ? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
examples/complete
works well, including the upgrade phase.
…o enable_nau_metrics
@antonbabenko if you get some time would you mind taking another look at this PR - thank you 🙏🏽 |
@bryantbiggs I plan to review this one and the one in the ECS module during the live stream tomorrow (Friday, 7th of April). Thank you very much for the work on all of these! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Please merge whenever you can or want.
This PR is included in version 4.0.0 🎉 |
I am not sure if this is the correct place, but I just want to add a note that we have been severely bitten by the change of the default value of:
Previously we were using version We bumped the version number to We later ran With version 3.16.1, when the VPC is created by Terraform, the default Security Group for the VPC (named
and one Outbound rule:
After upgrading to version Flipping the Whilst I don't mind the default value of I was able to reinstate the default Security Groups that Terraform had previously created for us in VPC Module 3.16.1 by adding the following to our VPC Module Config: manage_default_security_group = true
default_security_group_ingress = [
{
description = "Allow all"
protocol = -1
self = true
}
]
default_security_group_egress = [
{
description = "Allow all"
protocol = -1
from_port = 0
to_port = 0
cidr_blocks = "0.0.0.0/0"
}
] p.s. the documentation shows that I should write
|
…nd 4.0.1) that causes the Security Group on the default VPC to be emptied of rules, see: https://github.com/terraform-aws-modules/terraform-aws-vpc/pull/838\#issuecomment-1534161849
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
List of backwards incompatible changes
assign_ipv6_address_on_creation
has been removed; use the respective subnet type equivalent instead (i.e. -public_subnet_assign_ipv6_address_on_creation
)enable_classiclink
has been removed; it is no longer supported by AWS Subtle issue representingnull
as unset value, resulting in deprecation warning hashicorp/terraform#31730enable_classiclink_dns_support
has been removed; it is no longer supported by AWS Subtle issue representingnull
as unset value, resulting in deprecation warning hashicorp/terraform#31730Additional changes
Modified
map_public_ip_on_launch
now defaults tofalse
enable_dns_hostnames
now defaults totrue
enable_dns_support
now defaults totrue
manage_default_security_group
now defaults totrue
manage_default_route_table
now defaults totrue
manage_default_network_acl
now defaults totrue
-default
to the VPC name if a specific name is not providednull
Motivation and Context
resource-name
based hostnames #906Breaking Changes
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request