Skip to content

Releases: terraform-ibm-modules/terraform-ibm-icd-rabbitmq

v1.11.5

10 Aug 13:23
v1.11.5
8a9ff86

Choose a tag to compare

1.11.5 (2024-08-10)

Bug Fixes

v1.11.4

07 Aug 14:36
v1.11.4
8703314

Choose a tag to compare

1.11.4 (2024-08-07)

Bug Fixes

  • workaround provider idempotent issue (#219) (8703314)

v1.11.3

03 Aug 01:00
v1.11.3
2534fee

Choose a tag to compare

1.11.3 (2024-08-03)

Bug Fixes

  • deps: update terraform-module to v1.23.3 (#216) (2534fee)

v1.11.2

27 Jul 15:08
v1.11.2
35a4117

Choose a tag to compare

1.11.2 (2024-07-27)

Bug Fixes

v1.11.1

19 Jul 19:07
v1.11.1
3135072

Choose a tag to compare

1.11.1 (2024-07-19)

Bug Fixes

  • deps: update terraform-module to v1.23.0 (#200) (3135072)

v1.11.0

12 Jul 08:50
v1.11.0
227cf24

Choose a tag to compare

1.11.0 (2024-07-12)

Features

  • added new input variable member_host_flavor and updated default value of memory_mb to 8192.

    Reference: Cloud Database Hosting Models

    The host model switching section has details of the migrations that the service is rolling out. All instances will have to be switched and the time line for the migrations is outlined.

    During the transition both existing and new models are supported.

    Users of this module should consider the changes being implemented by the service. It is recommended that new deployments use the shared or isolated compute models to start, by specifying the member_host_flavor. It is recommended that existing deployments make updates to control the upgrade process by specifying shared or isolate compute configurations and the resource required to run the service, by adding the member_host_flavor. (#199) (227cf24)

v1.10.9

09 Jul 15:19
v1.10.9
1e5618b

Choose a tag to compare

1.10.9 (2024-07-09)

Bug Fixes

v1.10.8

04 Jul 13:26
v1.10.8
96650fe

Choose a tag to compare

1.10.8 (2024-07-04)

Bug Fixes

  • Updated description and validation for the backup_encryption_key_crn variable to ensure both Key Protect and HPCS keys follow the proper format.
    - Updated validation logic for the backup_encryption_key_crn in the main configuration. If no value is provided, the module will now default to using kms_key_crn for both Key Protect and HPCS as the backup encryption key. (#204) (96650fe)

v1.10.7

15 Jun 19:07
v1.10.7
3101db1

Choose a tag to compare

1.10.7 (2024-06-15)

Bug Fixes

v1.10.6

11 Jun 08:47
v1.10.6
40f2e66

Choose a tag to compare

1.10.6 (2024-06-11)

Bug Fixes

  • remove upper limit for required terraform version (#189) (40f2e66)