Skip to content

Releases: cloudposse/terraform-aws-emr-cluster

0.7.0: Updates to ChatOps - Automated commit (#17)

14 Jul 04:52
a11d1a9
Compare
Choose a tag to compare
## What
* Adds chatops commands
  - '/test all'
  - '/test bats'
  - '/test readme'
  - '/test terratest'
* Drops codefresh
* Drops slash-command-dispatch
* Removes codefresh badge
* Rebuilds README

## Why
* Change over from codefresh to GH Actions
* Facilitate testing of PRs from forks

0.6.0 Added kerberos_attributes configuration

29 May 18:18
e3076e7
Compare
Choose a tag to compare

what

  • Added kerberos_attributes configuration

why

  • To enhance security of cluster

0.5.0 Add variable to control S3 endpoint creation

20 Apr 20:56
6444ee4
Compare
Choose a tag to compare

what

  • Add the variable create_vpc_endpoint_s3 to control VPC S3 Endpoint creation

why

  • Users may already have their own S3 Endpoint in the selected VPC. If they do, this module fails because there can only be one.

0.4.0 Prevent EMR cluster recreation when javax.jdo.option.ConnectionPassword is used in configuration_json

20 Apr 15:26
8564f4e
Compare
Choose a tag to compare

what

  • Bootstrap action added that executes /bin/echo and as an argument md5 hash of configuration_json - dummy action
  • configuration_json added to lifecycle/ignore_changes

why

  • When configuration_json uses javax.jdo.option.ConnectionPassword then terraform will force recreate cluster with every apply. Reason for that is that AWS API for describe_cluster returns configuration with string '********instead of real password forjavax.jdo.option.ConnectionPassword. terraform` want to replace that "masked" password with actual password.

references

0.3.0 Add `application-autoscaling.amazonaws.com` as Trusted entity

04 Nov 19:56
Compare
Choose a tag to compare

what

  • Add application-autoscaling.amazonaws.com as Trusted entity

why

  • When using autoscaling, the autoscaling policy is failing to attach with the error:
Failed to provision the AutoScaling policy: Unable to assume IAM role: arn:aws:iam::*********:role/emr-stage-dataorc-emr-ec2-autoscaling

this is due to absence of application-autoscaling.amazonaws.com as Trusted entity

0.2.1 Add `configurations_json`. Fix `bootstrap_action`

23 Aug 21:46
d87d374
Compare
Choose a tag to compare

what

  • Add configurations_json
  • Fix bootstrap_action

why

  • Closes #3
  • Closes #4

0.2.0 Fix security groups. Set `visible_to_all_users` to `true`

05 Aug 16:42
93c40e6
Compare
Choose a tag to compare

what

  • Update egress for EMR managed security groups
  • Set visible_to_all_users to true

why

  • EMR will create and maintain rules for all managed security groups for master, slave and service access (when in private subnet). EMR will add all the required ingress and egress rules to the groups

  • When you specify managed security groups for a cluster, you must use the same type of security group, default or custom, for all managed security groups. For example, you can't specify a custom security group for the master instance, and then not specify a custom security group for core and task instances.

  • If visible_to_all_users is set to false, the cluster, after it's created, is not visible in the AWS console and even to terraform user that created it

references

0.1.0 Initial implementation

30 Jul 20:00
84f520f
Compare
Choose a tag to compare

what

  • Initial implementation of terraform-aws-emr-cluster module

why

  • Provision an Elastic MapReduce (EMR) cluster on AWS