-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add upgrade guide for version 1.0.0 #214
base: main
Are you sure you want to change the base?
Conversation
## v0.10.0-beta.9 | ||
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for | ||
This type was not properly converted on all code paths. | ||
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was accidentally calculated for |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was accidentally calculated for | |
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was incorrectly calculated for |
* The authentication token cache can now be controlled by the `polaris` provider configuration. | ||
* The `credentials` field of the `polaris` provider configuration is now optional. If omitted, the provider will look | ||
for credentials in the `RUBRIK_POLARIS_*` environment variables. | ||
* The `credentials` field of the `polaris` provider configuration now accepts, in addition to what it already accepts, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd suggest rephrasing this line:
The credentials
field of the polaris
provider configuration now also accepts the content of an RSC service account credentials file, in addition to its previously accepted input values.
* Add the `permissions` field to the `polaris_aws_cnp_account_attachments` resource. The `permissions` field should be | ||
used with the `id` field of the `polaris_aws_cnp_permissions` data source to trigger an update of the resource | ||
whenever the permissions changes. This update will move the RSC cloud account from the missing permissions state. | ||
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for | |
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was incorrectly calculated for |
* Add the field `manifest` to the `polaris_aws_exocompute_cluster_attachment` resource. The `manifest` field contains | ||
a Kubernetes manifest that can be passed to the Kubernetes Terraform provider or `kubectl` to establish a connection | ||
between the AWS EKS cluster and RSC. [[docs](../resources/aws_exocompute_cluster_attachment)] | ||
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. Use the `manifest` field |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. Use the `manifest` field | |
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. The `manifest` field should be used |
* The user-assigned managed identity for `cloud_native_archival_encryption` is not refreshed when the | ||
`polaris_azure_subscription` resource is updated. This will be fixed in a future release. | ||
|
||
In addition to the issues listed above, affecting this particular release of the provider, additional issues reported |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd recommend rephrasing this sentence:
In addition to the issues listed above that affect this particular release of the provider, further reported issues can be found on GitHub
```bash | ||
$ terraform init -upgrade | ||
``` | ||
After the Terraform provider has been updated, validate the correctness of the Terraform configuration files by running: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After the Terraform provider has been updated, validate the correctness of the Terraform configuration files by running: | |
After the Terraform provider has been upgraded, validate the correctness of the Terraform configuration files by running: |
} | ||
} | ||
``` | ||
This is expected since the new `permissions` field is being updated. Applying the diff will update the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is expected since the new `permissions` field is being updated. Applying the diff will update the | |
This is expected as the new `permissions` field is being updated. Applying the diff will update the |
be moved to the `CONNECTED` state. | ||
|
||
### polaris_azure_subscription | ||
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to this: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to this: | |
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to the following: |
} | ||
``` | ||
To remove the diff, copy the `permission_groups` values from the diff and add them to the Terraform configuration. Note, | ||
for the `cloud_native_protection` field, you most likely don't need the `CLOUD_CLUSTER_ES` permission group. Removing it |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Rather than suggest removing a particular permission group, it might be better to link to to this doc page which should ideally assist users with determining which groups they require: https://docs.rubrik.com/en-us/saas/saas/granular_manage_azr_perm_categories.html
You could then mention: "For example, if the Cloud Cluster ES feature is not being used, it would be advisable to remove the CLOUD_CLUSTER_ES permission group, as this will greatly reduce the number of permissions granted to RSC."
e72f532
to
a85e8fd
Compare
No description provided.