Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add upgrade guide for version 1.0.0 #214

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open

Conversation

johan3141592
Copy link
Member

No description provided.

@johan3141592 johan3141592 requested a review from a team as a code owner January 28, 2025 14:10
## v0.10.0-beta.9
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for
This type was not properly converted on all code paths.
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was accidentally calculated for
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was accidentally calculated for
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's ID was incorrectly calculated for

* The authentication token cache can now be controlled by the `polaris` provider configuration.
* The `credentials` field of the `polaris` provider configuration is now optional. If omitted, the provider will look
for credentials in the `RUBRIK_POLARIS_*` environment variables.
* The `credentials` field of the `polaris` provider configuration now accepts, in addition to what it already accepts,
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd suggest rephrasing this line:

The credentials field of the polaris provider configuration now also accepts the content of an RSC service account credentials file, in addition to its previously accepted input values.

* Add the `permissions` field to the `polaris_aws_cnp_account_attachments` resource. The `permissions` field should be
used with the `id` field of the `polaris_aws_cnp_permissions` data source to trigger an update of the resource
whenever the permissions changes. This update will move the RSC cloud account from the missing permissions state.
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was accidentally calculated for
* Fix a bug in the `polaris_aws_cnp_permissions` data source where the data source's id was incorrectly calculated for

* Add the field `manifest` to the `polaris_aws_exocompute_cluster_attachment` resource. The `manifest` field contains
a Kubernetes manifest that can be passed to the Kubernetes Terraform provider or `kubectl` to establish a connection
between the AWS EKS cluster and RSC. [[docs](../resources/aws_exocompute_cluster_attachment)]
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. Use the `manifest` field
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. Use the `manifest` field
* Deprecate the `setup_yaml` field in the `polaris_aws_exocompute_cluster_attachment` resource. The `manifest` field should be used

* The user-assigned managed identity for `cloud_native_archival_encryption` is not refreshed when the
`polaris_azure_subscription` resource is updated. This will be fixed in a future release.

In addition to the issues listed above, affecting this particular release of the provider, additional issues reported
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd recommend rephrasing this sentence:

In addition to the issues listed above that affect this particular release of the provider, further reported issues can be found on GitHub

```bash
$ terraform init -upgrade
```
After the Terraform provider has been updated, validate the correctness of the Terraform configuration files by running:
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
After the Terraform provider has been updated, validate the correctness of the Terraform configuration files by running:
After the Terraform provider has been upgraded, validate the correctness of the Terraform configuration files by running:

}
}
```
This is expected since the new `permissions` field is being updated. Applying the diff will update the
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This is expected since the new `permissions` field is being updated. Applying the diff will update the
This is expected as the new `permissions` field is being updated. Applying the diff will update the

be moved to the `CONNECTED` state.

### polaris_azure_subscription
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to this:
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to this:
Because of the new Azure permission groups support, RSC feature fields will result in a diff similar to the following:

}
```
To remove the diff, copy the `permission_groups` values from the diff and add them to the Terraform configuration. Note,
for the `cloud_native_protection` field, you most likely don't need the `CLOUD_CLUSTER_ES` permission group. Removing it
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rather than suggest removing a particular permission group, it might be better to link to to this doc page which should ideally assist users with determining which groups they require: https://docs.rubrik.com/en-us/saas/saas/granular_manage_azr_perm_categories.html

You could then mention: "For example, if the Cloud Cluster ES feature is not being used, it would be advisable to remove the CLOUD_CLUSTER_ES permission group, as this will greatly reduce the number of permissions granted to RSC."

@johan3141592 johan3141592 changed the base branch from beta to main February 4, 2025 15:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants