Skip to content

Commit 8ff4d7f

Browse files
authored
fix: update landing-zone-vsi module to v3.0.0 (#638)
BREAKING CHANGE: If your SLZ solution provisions a VSI and you have enabled a floating IP for it, when upgrading to this version floating IPs are going to be deleted and recreated upon apply. This is due to a bug where the floating IPs were being created incorrectly in the Default resource group. Upon re-creation, the floating IPs will be created in the same resource group as the VSI. Please plan accordingly before upgrading incase this change will cause disruption for whatever is using the floating IPs. NOTE: By default, the only deployable architecture impacted here is the VSI quickstart flavor, as it provisions a floating IP for use as a jumpbox. If however you have customised any of the other deployable architectures to provision any floating IPs, they will also be impacted.
1 parent f06e628 commit 8ff4d7f

File tree

7 files changed

+11
-11
lines changed

7 files changed

+11
-11
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -838,15 +838,15 @@ module "cluster_pattern" {
838838

839839
| Name | Source | Version |
840840
|------|--------|---------|
841-
| <a name="module_bastion_host"></a> [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
841+
| <a name="module_bastion_host"></a> [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |
842842
| <a name="module_dynamic_values"></a> [dynamic\_values](#module\_dynamic\_values) | ./dynamic_values | n/a |
843-
| <a name="module_f5_vsi"></a> [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
843+
| <a name="module_f5_vsi"></a> [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |
844844
| <a name="module_key_management"></a> [key\_management](#module\_key\_management) | ./kms | n/a |
845845
| <a name="module_placement_group_map"></a> [placement\_group\_map](#module\_placement\_group\_map) | ./dynamic_values/config_modules/list_to_map | n/a |
846846
| <a name="module_ssh_keys"></a> [ssh\_keys](#module\_ssh\_keys) | ./ssh_key | n/a |
847847
| <a name="module_teleport_config"></a> [teleport\_config](#module\_teleport\_config) | ./teleport_config | n/a |
848-
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 7.7.0 |
849-
| <a name="module_vsi"></a> [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 2.12.1 |
848+
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 7.10.0 |
849+
| <a name="module_vsi"></a> [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 3.0.0 |
850850

851851
### Resources
852852

bastion_host.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ module "teleport_config" {
4242

4343
module "bastion_host" {
4444
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
45-
version = "2.12.1"
45+
version = "3.0.0"
4646
for_each = local.bastion_vsi_map
4747
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
4848
create_security_group = each.value.security_group == null ? false : true

f5_vsi.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ locals {
117117

118118
module "f5_vsi" {
119119
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
120-
version = "2.12.1"
120+
version = "3.0.0"
121121
for_each = local.f5_vsi_map
122122
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
123123
create_security_group = each.value.security_group == null ? false : true

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ locals {
88

99
module "vpc" {
1010
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
11-
version = "7.7.0"
11+
version = "7.10.0"
1212
for_each = local.vpc_map
1313
depends_on = [ibm_iam_authorization_policy.policy]
1414
name = each.value.prefix

patterns/vsi-extension/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ locals {
7070

7171
module "vsi" {
7272
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
73-
version = "2.8.2"
73+
version = "3.0.0"
7474
resource_group_id = data.ibm_is_vpc.vpc_by_id.resource_group
7575
create_security_group = true
7676
prefix = "${var.prefix}-vsi"

patterns/vsi-extension/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ variable "existing_kms_instance_guid" {
8080

8181
variable "skip_iam_authorization_policy" {
8282
type = bool
83-
description = "Set to `true` to skip the creation of an IAM authorization policy that permits all storage blocks to read the encryption key from the KMS instance. If set to `false` (and creating a policy), specify the GUID of the KMS instance in the `existing_kms_instance_guid` variable."
84-
default = false
83+
description = "By default (true), the Landing Zone VPC creates an IAM authorization policy that permits all storage blocks to read the encryption key from the KMS instance. Set to false to create the authorization policy in a different KMS instance, and specify the GUID of the KMS instance in the existing_kms_instance_guid variable."
84+
default = true
8585
}
8686

8787
variable "vsi_per_subnet" {

virtual_servers.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ data "ibm_is_image" "image" {
4141

4242
module "vsi" {
4343
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
44-
version = "2.12.1"
44+
version = "3.0.0"
4545
for_each = local.vsi_map
4646
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
4747
create_security_group = each.value.security_group == null ? false : true

0 commit comments

Comments
 (0)