Skip to content

Commit

Permalink
fix: update landing-zone-vsi module to v3.0.0 (#638)
Browse files Browse the repository at this point in the history
BREAKING CHANGE: If your SLZ solution provisions a VSI and you have enabled a floating IP for it, when upgrading to this version floating IPs are going to be deleted and recreated upon apply. This is due to a bug where the floating IPs were being created incorrectly in the Default resource group. Upon re-creation, the floating IPs will be created in the same resource group as the VSI.

Please plan accordingly before upgrading incase this change will cause disruption for whatever is using the floating IPs.

NOTE: By default, the only deployable architecture impacted here is the VSI quickstart flavor, as it provisions a floating IP for use as a jumpbox. If however you have customised any of the other deployable architectures to provision any floating IPs, they will also be impacted.
  • Loading branch information
Aashiq-J authored Nov 28, 2023
1 parent f06e628 commit 8ff4d7f
Show file tree
Hide file tree
Showing 7 changed files with 11 additions and 11 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -838,15 +838,15 @@ module "cluster_pattern" {

| Name | Source | Version |
|------|--------|---------|
| <a name="module_bastion_host"></a> [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
| <a name="module_bastion_host"></a> [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |
| <a name="module_dynamic_values"></a> [dynamic\_values](#module\_dynamic\_values) | ./dynamic_values | n/a |
| <a name="module_f5_vsi"></a> [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
| <a name="module_f5_vsi"></a> [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |
| <a name="module_key_management"></a> [key\_management](#module\_key\_management) | ./kms | n/a |
| <a name="module_placement_group_map"></a> [placement\_group\_map](#module\_placement\_group\_map) | ./dynamic_values/config_modules/list_to_map | n/a |
| <a name="module_ssh_keys"></a> [ssh\_keys](#module\_ssh\_keys) | ./ssh_key | n/a |
| <a name="module_teleport_config"></a> [teleport\_config](#module\_teleport\_config) | ./teleport_config | n/a |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 7.7.0 |
| <a name="module_vsi"></a> [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 7.10.0 |
| <a name="module_vsi"></a> [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |

### Resources

Expand Down
2 changes: 1 addition & 1 deletion bastion_host.tf
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ module "teleport_config" {

module "bastion_host" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
version = "2.12.1"
version = "3.0.0"
for_each = local.bastion_vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true
Expand Down
2 changes: 1 addition & 1 deletion f5_vsi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ locals {

module "f5_vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
version = "2.12.1"
version = "3.0.0"
for_each = local.f5_vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true
Expand Down
2 changes: 1 addition & 1 deletion main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ locals {

module "vpc" {
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
version = "7.7.0"
version = "7.10.0"
for_each = local.vpc_map
depends_on = [ibm_iam_authorization_policy.policy]
name = each.value.prefix
Expand Down
2 changes: 1 addition & 1 deletion patterns/vsi-extension/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ locals {

module "vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
version = "2.8.2"
version = "3.0.0"
resource_group_id = data.ibm_is_vpc.vpc_by_id.resource_group
create_security_group = true
prefix = "${var.prefix}-vsi"
Expand Down
4 changes: 2 additions & 2 deletions patterns/vsi-extension/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -80,8 +80,8 @@ variable "existing_kms_instance_guid" {

variable "skip_iam_authorization_policy" {
type = bool
description = "Set to `true` to skip the creation of an IAM authorization policy that permits all storage blocks to read the encryption key from the KMS instance. If set to `false` (and creating a policy), specify the GUID of the KMS instance in the `existing_kms_instance_guid` variable."
default = false
description = "By default (true), the Landing Zone VPC creates an IAM authorization policy that permits all storage blocks to read the encryption key from the KMS instance. Set to false to create the authorization policy in a different KMS instance, and specify the GUID of the KMS instance in the existing_kms_instance_guid variable."
default = true
}

variable "vsi_per_subnet" {
Expand Down
2 changes: 1 addition & 1 deletion virtual_servers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ data "ibm_is_image" "image" {

module "vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
version = "2.12.1"
version = "3.0.0"
for_each = local.vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true
Expand Down

0 comments on commit 8ff4d7f

Please sign in to comment.