vault-guides
vault-guides copied to clipboard
Updating the example for current software versions
Changes to aws-kms-unseal-ha:
- Updated
versions.tfto required Terraform 0.13 or greater. - Vault updated to 1.6.3. URL added to the
variables.tf. - Consul updated from 1.0.0 to 1.9.4. Additionally, extrapolated OS & CPU architecture in the
userdata.tpl. - Moved from Ubuntu 16.04 (Xenial) LTS to 20.04 (Focal) LTS.
- Updated
README.mdto update the unseal instructions.
Changes to aws-kms-unseal:
- Added
versions.tffile; set required version of Terraform to 0.13. - Bumped version of Vault to 1.6.3 from 1.6.0.
Notes:
Tested both plans (aws-kms-unseal & aws-kms-unseal-ha) with Terraform v0.13.0 and v0.14.8. Terraform v0.14.8 was the most recent as of commits & PR.
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement
Learn more about why HashiCorp requires a CLA and what the CLA includes
Kelly Hair seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you already have a GitHub account, please add the email address used for this commit to your account.
Have you signed the CLA already but the status is still pending? Recheck it.
I noticed that I left some commented lines in. Will clean up & resubmit.
Updated files; reopening
@kellyhair Could you please review and agree to CLA?
