Skip to content

Releases: terraform-ibm-modules/terraform-ibm-icd-redis

v1.17.3

09 Feb 14:38
v1.17.3
fc2986b
Compare
Choose a tag to compare

1.17.3 (2025-02-09)

Bug Fixes

v1.17.2

09 Feb 04:21
v1.17.2
bd5d2b9
Compare
Choose a tag to compare

1.17.2 (2025-02-09)

Bug Fixes

v1.17.1

08 Feb 07:50
v1.17.1
3dc4604
Compare
Choose a tag to compare

1.17.1 (2025-02-08)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#514) (3dc4604)

v1.17.0

31 Jan 14:52
v1.17.0
a4e04b6
Compare
Choose a tag to compare

1.17.0 (2025-01-31)

Features

  • updated the service_credential_secrets input object schema of the DA to support creating service specific roles
    * The service_credentials_source_service_role attribute has been renamed to service_credentials_source_service_role_crn and now requires a full CRN value. For example: `service_credentials_source_service_role_crn = "crn:v1:bluemix:public:iam::::role:Editor" (#510) (a4e04b6)

v1.16.4

31 Jan 14:22
v1.16.4
a0e5941
Compare
Choose a tag to compare

1.16.4 (2025-01-31)

Bug Fixes

  • updated the tags input to be a list of string (#498) (a0e5941)

v1.16.3

27 Jan 06:34
v1.16.3
9f77ea2
Compare
Choose a tag to compare

1.16.3 (2025-01-27)

Bug Fixes

  • update DA to accept prefix as empty string ("") and mark as required in catalog manifest (#508) (9f77ea2)

v1.16.2

23 Jan 15:56
v1.16.2
edd22c3
Compare
Choose a tag to compare

1.16.2 (2025-01-23)

Bug Fixes

  • fix bug in the DA which can occur when using BYOK / KYOK for data encryption, but using the default ICD key for backups encryption (#507) (edd22c3)

v1.16.1

17 Jan 17:41
v1.16.1
9108356
Compare
Choose a tag to compare

1.16.1 (2025-01-17)

Bug Fixes

  • fixed bug with logic that produced and error when passing a value for admin password (#504) (9108356)

v1.16.0

15 Jan 15:19
v1.16.0
cdb3129
Compare
Choose a tag to compare

1.16.0 (2025-01-15)

(#494) (cdb3129)

Features

  • Root module updates:
    • existing_kms_instance_guid is no longer a supported input. The code will now parse the GUID from the KMS key CRN
    • added new input use_same_kms_key_for_backups to give more control over KMS key usage
    • kms_encryption_enabled has been renamed to use_ibm_owned_encryption_key
  • fscloud submodule updates:
    • added new inputs use_default_backup_encryption_key and use_same_kms_key_for_backups
  • DA updates:
    • Removed the input existing_backup_kms_instance_crn. If you want to use a different KMS key for backups, you can use the existing_backup_kms_key_crn input to use an existing key. The DA only supports creating an new key that will be used for both data and backups encryption.
    • If passing a value for ibmcloud_kms_api_key, and creating a KMS auth policy, that policy will now be scoped to the exact KMS key.

v1.15.11

12 Jan 10:12
v1.15.11
056bda8
Compare
Choose a tag to compare

1.15.11 (2025-01-12)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#499) (056bda8)