Releases: terraform-ibm-modules/terraform-ibm-icd-postgresql
Releases · terraform-ibm-modules/terraform-ibm-icd-postgresql
v3.19.6
16 Nov 10:24
Compare
Sorry, something went wrong.
No results found
3.19.6 (2024-11-16)
Bug Fixes
deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v4.16.9 (#529 ) (120c419 )
v3.19.5
16 Nov 04:14
Compare
Sorry, something went wrong.
No results found
3.19.5 (2024-11-16)
Bug Fixes
deps: update terraform ibm to latest for deployable architectures (#527 ) (1f13f07 )
v3.19.4
15 Nov 17:27
Compare
Sorry, something went wrong.
No results found
3.19.4 (2024-11-15)
Bug Fixes
added fix to exclude group from point in time recovery (#525 ) (ed0458e )
v3.19.3
12 Nov 21:01
Compare
Sorry, something went wrong.
No results found
3.19.3 (2024-11-12)
Bug Fixes
fix bug when setting use_ibm_owned_encryption_key to true in the DA (#522 ) (857e1fd )
v3.19.2
12 Nov 13:28
Compare
Sorry, something went wrong.
No results found
v3.19.1
12 Nov 12:27
Compare
Sorry, something went wrong.
No results found
3.19.1 (2024-11-12)
Bug Fixes
deps: update terraform ibm to latest for deployable architectures (#501 ) (2ef000c )
v3.19.0
12 Nov 10:58
Compare
Sorry, something went wrong.
No results found
3.19.0 (2024-11-12)
Features
expose the ability to use default encryption keys in fscloud submodule + DA
exposed the ability to set the IBM terraform provider visibility in the DA (#521 ) (ed78199 )
v3.18.2
11 Nov 11:26
Compare
Sorry, something went wrong.
No results found
3.18.2 (2024-11-11)
Bug Fixes
updated required IBM provider version to >= 1.70.0, < 2.0.0
updated CBR module to 1.28.1 (#519 ) (7a73dc5 )
v3.18.1
10 Nov 19:40
Compare
Sorry, something went wrong.
No results found
3.18.1 (2024-11-10)
Bug Fixes
Fix an issue in the original ICD hosting model logic for conditionally including the group block during a database restore operation (#516 ) (a1ab78d )
v3.18.0
07 Nov 15:08
Compare
Sorry, something went wrong.
No results found
3.18.0 (2024-11-07)
Features
added support to the DA to use a different KMS instance / key for backup encryption using new optional inputs existing_backup_kms_key_crn and existing_backup_kms_instance_crn
added support to to the DA to provision and instance from a backup CRN using new input backup_crn (#511 ) (68cd6c7 )