Releases: ExpediaGroup/apiary-data-lake
Releases · ExpediaGroup/apiary-data-lake
Fixed type error in `apiary_consumer_prefix_iamroles` variable.
[6.12.1] - 2022-03-17
Fixed
- Fixed type error in
apiary_consumer_prefix_iamroles
variable.
Added functionality for allowing certain IAM roles to have unrestricted read access by schema/prefix mapping
[6.12.0] - 2022-03-15
Added
- Added functionality for allowing certain IAM roles to have unrestricted read access by schema/prefix mapping - see
apiary_consumer_prefix_iamroles
. - Documented
apiary_consumer_iamroles
,apiary_consumer_prefix_iamroles
, andapiary_customer_condition
inVARIABLES.md
.
v6.11.5: Feature/enforce object ownership (#211)
* enforce bucket ownership * configure BucketOwnerEnforced to disable bucket ACLs * cleanup bucket policy * update github workflow versions * configure aws required_providers Co-authored-by: Raj Poluri <[email protected]>
Make rds_family as variable
[6.11.4] - 2021-12-10
Added
- make rds_family as variable
Make EKS & ECS dashboard optional
[6.11.3] - 2021-11-22
Added
- make EKS & ECS dashboard optional
Added Governance Role with read and tag permissions for apiary buckets
Added
- Added governance role read and tag objects permission to apiary buckets
v6.11.1: Restrict S3 other public access (#207)
* Restrict public access s3 other * Update CHANGELOG.md
Adding HMS liveness and readiness checks
Adding Hive Readiness and Liveness probes (#205) * Liveness and readiness probe * adjusting timeouts * Update VARIABLES.md
Add `restrict_public_buckets = true` to s3 bucket public access settings
[6.10.6] - 2021-10-26
Added
- Add
restrict_public_buckets = true
to s3 bucket public access settings
v6.10.5: Feature/readwrite ingress (#203)
* read-write metastore ingress * redundant ingress * fix * restrict apiary DB access to vpc * update changelog * Update VARIABLES.md Co-authored-by: Scott Barnhart <[email protected]> * Update variables.tf Co-authored-by: Scott Barnhart <[email protected]> Co-authored-by: Raj Poluri <[email protected]> Co-authored-by: Scott Barnhart <[email protected]>