Terraform
- Terraform Enterprise
- 1.0.x (latest)
- v202507-1
- v202506-1
- v202505-1
- v202504-1
- v202503-1
- v202502-2
- v202502-1
- v202501-1
- v202411-2
- v202411-1
- v202410-1
- v202409-3
- v202409-2
- v202409-1
- No versions of this document exist before v202408-1. Click below to redirect to the version homepage.
- v202408-1
- v202407-1
- v202406-1
- v202405-1
- v202404-2
- v202404-1
- v202402-2
- v202402-1
- v202401-2
- v202401-1
- v202312-1
- v202311-1
- v202310-1
- v202309-1
- v202308-1
- v202307-1
- v202306-1
- v202305-2
- v202305-1
- v202304-1
- v202303-1
- v202302-1
- v202301-2
- v202301-1
- v202212-2
- v202212-1
- v202211-1
- v202210-1
- v202209-1
- v202208-3
- v202208-2
- v202208-1
- v202207-2
- v202207-1
- v202206-1
TFE Release v202204-2 (610 Required)
Known Issues
- [May 3, 2022] tfe-admin health-checkfails withsh: /root/ptfe-health-check: not foundafter a change to theptfe_health_checkcontainer Entrypoint to run the process as an unprivileged user under/run/ptfe-health-checkbut thealiaswas still referencing/root/ptfe-health-check. This issue will be fixed inv202205-1.
- [May 10, 2022] This release includes an issue with Audit Log tagging, causing audit logs to no longer be tagged with the [Audit Log] prefix. This issue will be fixed in 'v202205-1'.
CHANGES SINCE v202204-1
The tfe-bootstrap container now automatically negotiates the Docker API version before making requests to the Docker API to prevent Error response from daemon: client version 1.41 is too new. Maximum supported API version is 1.40 errors upon Terraform Enterprise installation or upgrade.
UPCOMING APPLICATION LEVEL BREAKING CHANGE
The Terraform Enterprise May 2022 release will change the names of application containers from ptfe_* to tfe-* for product consistency. For example, ptfe_nginx will be changed to tfe-nginx. If you have downstream configuration (monitoring, log forwarding etc.) that references the older naming scheme, you will need to update container references to the new names.
APPLICATION LEVEL BREAKING CHANGES
- The demo operational mode has been removed. If you are currently running demo mode, we strongly suggest that you upgrade to Terraform Enterprise v202204-1. To do this, you must migrate your application data.
APPLICATION LEVEL FEATURES
- Added a log storage memory limit to log forwarding. When the 128MB limit is reached, logs will be stored in a buffer on the filesystem until they can be forwarded. 
- Changed cost estimation so that it uses the HTTP proxy settings configured within Terraform Enterprise. 
- Added the ability to specify an 'SSO team ID' for teams that Terraform Enterprise can use to map teams to non-human readable 'MemberOf' values in SAML assertions. 
- Updated display of download count metrics for modules in the private registry 
- Added an API endpoint to fetch a workspace's current state version outputs. Refer to Show Current State Version Outputs For a Workspace for details. 
- Updated the default - json-filelog rotation settings for all containers in order to improve the performance of support bundle generation.- Previous Settings - New Settings - max-size: 10mand- max-file: 3- max-size: 8mand- max-file: 4- max-size: 10mand- max-file: 10- max-size: 32mand- max-file: 4- max-size: 100mand- max-file: 10- max-size: 64mand- max-file: 8- max-size: 100mand- max-file: 200- max-size: 50mand- max-file: 20
APPLICATION LEVEL BUG FIXES
- The iact_subnet_listsetting now allows you to use,to separate IPv4 addresses.
- Fixed situation where occasionally you could not create a workspace after a workspace with the same name was deleted.
- Fixed an issue causing configuration version tarballs downloaded through the API to have a non-human-readable filename and no file extension.
- Fixed several issues with Terraform Cloud agent pools.
APPLICATION LEVEL SECURITY FIXES
- Added no-cache and no-store headers for some API responses that may contain sensitive data (2FA configuration, SSO configuration, and state versions).
- Removed credentials from health-check endpoint for an internal service.
- Adopted container updates to address reported vulnerabilities in underlying packages / dependencies.