Skip to content

Commit d6d1ddb

Browse files
authored
Merge branch 'main' into WAF-300
2 parents 9913d3f + 9a89e6d commit d6d1ddb

File tree

11 files changed

+141
-5
lines changed

11 files changed

+141
-5
lines changed

content/terraform-enterprise/1.0.x/docs/enterprise/releases/1.0.x/index.mdx

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ Below is a list of the most recent Terraform Enterprise Releases that can deploy
1414

1515
| Version | Linked <br />Terraform CLI\** | Sentinel | Tested Kubernetes Versions (EKS, AKS, GKE) | Helm Chart Version |
1616
| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ------------------------------ | ------------------ |
17+
| [1.0.2](#1-0-2) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [1.33](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.33](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.5](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.5) |
1718
| [1.0.1](#1-0-1) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [1.33](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.33](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.5](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.5) |
1819
| [1.0.0](#1-0-0) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [1.33](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.33](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.5](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.5) |
1920

@@ -25,6 +26,7 @@ Below is a list of the most recent Terraform Enterprise Releases that can deploy
2526

2627
| Version | Linked <br />Terraform CLI\** | Sentinel | Recommended Docker Compose version |
2728
| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- |
29+
| [1.0.2](#1-0-2) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [V2](https://docs.docker.com/compose/migrate/) |
2830
| [1.0.1](#1-0-1) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [V2](https://docs.docker.com/compose/migrate/) |
2931
| [1.0.0](#1-0-0) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [V2](https://docs.docker.com/compose/migrate/) |
3032

@@ -36,6 +38,7 @@ Below is a list of the most recent Terraform Enterprise Releases that can deploy
3638

3739
| Version | Linked <br />Terraform CLI\** | Sentinel | Tested Podman version |
3840
| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- |
41+
| [1.0.2](#1-0-2) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) |
3942
| [1.0.1](#1-0-1) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) |
4043
| [1.0.0](#1-0-0) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) |
4144

@@ -47,6 +50,7 @@ Below is a list of the most recent Terraform Enterprise Releases that can deploy
4750

4851
| Version | Linked <br />Terraform CLI\** | Sentinel | Tested Nomad versions | Min supported version |
4952
| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | --------------------------- | --------------------- |
53+
| [1.0.2](#1-0-2) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | 1.7 | 1.5 |
5054
| [1.0.1](#1-0-1) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | 1.7 | 1.5 |
5155
| [1.0.0](#1-0-0) | [1.12.1](https://github.com/hashicorp/terraform/releases/tag/v1.12.1) | [0.40.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-40-0-may-12-2025) | 1.7 | 1.5 |
5256

@@ -57,6 +61,19 @@ Below is a list of the most recent Terraform Enterprise Releases that can deploy
5761

5862
\** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions).
5963

64+
## 1.0.2
65+
<span class="h4-size">2025-10-15</span>
66+
67+
Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1)
68+
69+
Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:edc06293b395e5beb3dfbbda4e89341334ab184c5895b81cf31c074dadc43ff7`, arm64/linux `sha256:7d7dfa2b283f252b8a65b1689a49db2b3a0b81fcaefd11a560a93baf8ad6041f`
70+
71+
## Bug Fixes
72+
1. Plan output will now be rendered when Structured Run Output (SRO) is enabled. Previously, the output from `terraform plan` and `terraform apply` was not displayed as expected when SRO was active.
73+
74+
## Security
75+
1. Security vulnerabilities have been addressed and resolved in this update to enhance overall system protection.
76+
6077
## 1.0.1
6178
<span class="h4-size">2025-09-15</span>
6279

content/terraform-enterprise/1.0.x/docs/enterprise/releases/index.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ description: >-
1010

1111
<Tip title="Next Release">
1212

13-
The next patch release for 1.0.x is scheduled for the week of October 11, 2025
14-
1513
The next minor release for 1.1.x is scheduled for the week of November 11, 2025
1614

1715
</Tip>
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: docs
3+
page_title: Why use TLS?
4+
description: >-
5+
Understand the benefits of securing your Vault clusters with end-to-end TLS.
6+
---
7+
8+
# Why use TLS?
9+
10+
You can enhance the overall security posture of your Vault cluster when you
11+
secure communications with TLS to ensure that data transmitted between Vault
12+
nodes and clients remains confidential and tamper-proof.
13+
14+
@include 'ld-images/deploy/secure-vault-tls.mdx'
15+
16+
Use mutual TLS with your Vault cluster deployments to protect sensitive data and
17+
prevent unauthorized access with enhanced compliance, governance, auditing
18+
capabilities, and incident response.
19+
20+
## TLS benefits
21+
22+
- **Improved data protection**.
23+
TLS prevents unauthorized access or communication with the Vault cluster to
24+
ensure data availability based on your security policies. TLS also protects
25+
sensitive data in transit to prevent interception or tampering.
26+
27+
- **Strong identity verification**.
28+
Vault cluster nodes and clients verify identities from TLS certificates before
29+
communicating to enable trusted operations and prevent impersonation.
30+
31+
- **Improved compliance and governance**.
32+
Implementing mutual TLS in your Vault clusters aligns your deployments with
33+
industry best practices and regulatory requirements like HIPAA, PCI-DSS, and
34+
others.
35+
36+
- **Reduce risk of data leaks**.
37+
When you operate Vault clusters with mutual TLS enabled, you minimize the risk
38+
of data leaks and unauthorized access to sensitive information.
39+
40+
- **Improved incident response**.
41+
Mutual TLS helps to limit the exposure or damage from unauthorized access to
42+
sensitive data stored in Vault, which makes incident response more
43+
straightforward.
44+
45+
## TLS resources
46+
47+
- [Default Vault TLS configuration](/vault/docs/configuration/listener/tcp#default-tls-configuration)
48+
- [Configure TLS for your Vault TCP listener](/vault/docs/configuration/listener/tcp/tcp-tls)
49+
- [Vault installation to minikube via Helm with TLS enabled](/vault/tutorials/kubernetes/kubernetes-minikube-tls)
50+
- [Medium blog: Enabling TLS on your Vault cluster on Kubernetes](https://medium.com/@martin.hodges/enabling-tls-on-your-vault-cluster-on-kubernetes-0d20439b13d0)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
<ImageConfig hideBorder>
2+
3+
![Secure Vault intra-cluster and inter-cluster communications with TLS](/img/diagram-secure-vault-tls-dark.png#dark-theme-only)
4+
5+
</ImageConfig>
6+
7+
<ImageConfig hideBorder>
8+
9+
![Secure Vault intra-cluster and inter-cluster communications with TLS](/img/diagram-secure-vault-tls.png#light-theme-only)
10+
11+
</ImageConfig>

content/vault/v1.19.x/data/docs-nav-data.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -666,6 +666,10 @@
666666
{
667667
"title": "Deploy Vault",
668668
"routes": [
669+
{
670+
"title": "Why use TLS?",
671+
"path": "deploy/why-use-tls"
672+
},
669673
{
670674
"title": "Run as a service",
671675
"path": "deploy/run-as-service"
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: docs
3+
page_title: Why use TLS?
4+
description: >-
5+
Understand the benefits of securing your Vault clusters with end-to-end TLS.
6+
---
7+
8+
# Why use TLS?
9+
10+
You can enhance the overall security posture of your Vault cluster when you
11+
secure communications with TLS to ensure that data transmitted between Vault
12+
nodes and clients remains confidential and tamper-proof.
13+
14+
@include 'ld-images/deploy/secure-vault-tls.mdx'
15+
16+
Use mutual TLS with your Vault cluster deployments to protect sensitive data and
17+
prevent unauthorized access with enhanced compliance, governance, auditing
18+
capabilities, and incident response.
19+
20+
## TLS benefits
21+
22+
- **Improved data protection**.
23+
TLS prevents unauthorized access or communication with the Vault cluster to
24+
ensure data availability based on your security policies. TLS also protects
25+
sensitive data in transit to prevent interception or tampering.
26+
27+
- **Strong identity verification**.
28+
Vault cluster nodes and clients verify identities from TLS certificates before
29+
communicating to enable trusted operations and prevent impersonation.
30+
31+
- **Improved compliance and governance**.
32+
Implementing mutual TLS in your Vault clusters aligns your deployments with
33+
industry best practices and regulatory requirements like HIPAA, PCI-DSS, and
34+
others.
35+
36+
- **Reduce risk of data leaks**.
37+
When you operate Vault clusters with mutual TLS enabled, you minimize the risk
38+
of data leaks and unauthorized access to sensitive information.
39+
40+
- **Improved incident response**.
41+
Mutual TLS helps to limit the exposure or damage from unauthorized access to
42+
sensitive data stored in Vault, which makes incident response more
43+
straightforward.
44+
45+
## TLS resources
46+
47+
- [Default Vault TLS configuration](/vault/docs/configuration/listener/tcp#default-tls-configuration)
48+
- [Configure TLS for your Vault TCP listener](/vault/docs/configuration/listener/tcp/tcp-tls)
49+
- [Vault installation to minikube via Helm with TLS enabled](/vault/tutorials/kubernetes/kubernetes-minikube-tls)
50+
- [Medium blog: Enabling TLS on your Vault cluster on Kubernetes](https://medium.com/@martin.hodges/enabling-tls-on-your-vault-cluster-on-kubernetes-0d20439b13d0)
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
![Secure Vault intra-cluster and inter-cluster communications with TLS](/img/diagram-secure-vault-tls-dark.png#dark-theme-only)
2+
![Secure Vault intra-cluster and inter-cluster communications with TLS](/img/diagram-secure-vault-tls.png#light-theme-only)

content/vault/v1.20.x/data/docs-nav-data.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -711,6 +711,10 @@
711711
{
712712
"title": "Deploy Vault",
713713
"routes": [
714+
{
715+
"title": "Why use TLS?",
716+
"path": "deploy/why-use-tls"
717+
},
714718
{
715719
"title": "Run as a service",
716720
"path": "deploy/run-as-service"
18.9 KB
Loading
19.2 KB
Loading

0 commit comments

Comments
 (0)