Skip to content

Releases: scribd/terraform-aws-datadog

v3.3.2

30 Sep 13:08
Compare
Choose a tag to compare

3.3.2 (2024-09-30)

Bug Fixes

  • Work around limit in lambda policy size (201d6c3)

v3.3.1

19 Feb 18:52
Compare
Choose a tag to compare

3.3.1 (2024-02-19)

Bug Fixes

  • bump datadog forwarder version (3678529)

v3.3.0

15 Feb 14:44
Compare
Choose a tag to compare

3.3.0 (2024-02-15)

Features

  • Switch to for_each for log forwarding resources (0781beb)

v3.2.2

16 Aug 19:10
Compare
Choose a tag to compare

3.2.2 (2023-08-16)

Bug Fixes

  • enforce only minimum version of terraform (7195f64), closes #55

v3.2.1

20 Jul 17:51
Compare
Choose a tag to compare

3.2.1 (2023-07-20)

Bug Fixes

  • Truncate statement_id length after 100 characters (#54) (3f98ed3)

v3.2.0

17 Jul 17:52
Compare
Choose a tag to compare

3.2.0 (2023-07-17)

Features

  • remove terraform resource for ELB bucket ACL configuration (terraform-only change) (fc770ec)
    • When upgrading, it will look like the ACL is being destroyed. The terraform state for the ACL will be destroyed, but the ACL itself will not. See #56 for additional details.

v3.1.1-alpha.2

11 Jul 21:45
Compare
Choose a tag to compare
v3.1.1-alpha.2 Pre-release
Pre-release

3.1.1-alpha.2 (2023-07-11)

Bug Fixes

  • limit statement_id length to 100 chars (6c32ece)

v3.1.1-alpha.1

11 Jul 21:02
Compare
Choose a tag to compare
v3.1.1-alpha.1 Pre-release
Pre-release

3.1.1-alpha.1 (2023-07-11)

Bug Fixes

  • Remove private ACL terraform resource. (b50ccb2)

v3.1.0

26 Jan 19:05
Compare
Choose a tag to compare

3.1.0 (2023-01-26)

Features

  • enable support for Terraform 1.3.x (#51) (1d4c786)

v3.0.0

05 Apr 19:38
Compare
Choose a tag to compare

3.0.0 (2022-04-05)

  • feat!: enable support for aws provider 4.0+ (#49) (5bc98cb), closes #49

BREAKING CHANGES

  • This release drops support for AWS provider <4.0

When updating to this version, the diff will show each of the new resources as needing to be created. However, each of the new aws_s3_bucket_* resources relies on S3 API calls that utilize a PUT action in order to modify the target S3 bucket. Because these API calls adhere to standard HTTP methods for REST APIs, they should handle situations where the target configuration already exists (as noted in the HTTP RFC). Given that this is the case, it's not strictly necessary to import any new aws_s3_bucket_* resources that are a one-to-one translation from previous versions of the AWS provider -- on the next terraform apply, they'll attempt the PUT, and update the state with the results as necessary.