diff --git a/README.md b/README.md index a381e259..c11c0503 100644 --- a/README.md +++ b/README.md @@ -256,8 +256,8 @@ Optionally, you need the following permissions to attach Access Management tags | [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.28.1 | -| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.14.4 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29.0 | +| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.15.1 | ### Resources diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 217d65ab..8effebc7 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -22,7 +22,7 @@ locals { module "kp_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.16.9" + version = "4.16.10" key_protect_instance_name = "${var.prefix}-kp-instance" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 8e3a7fae..fe62d4f3 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos_fscloud" { source = "terraform-ibm-modules/cos/ibm" - version = "8.14.4" + version = "8.15.1" resource_group_id = module.resource_group.resource_group_id create_cos_bucket = false cos_instance_name = "${var.prefix}-cos" @@ -30,7 +30,7 @@ module "cos_fscloud" { module "flowlogs_bucket" { source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.14.4" + version = "8.15.1" bucket_configs = [ { @@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_vpc_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.28.1" + version = "1.29.0" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone representing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -124,7 +124,7 @@ module "cbr_vpc_zone" { module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.28.1" + version = "1.29.0" name = "${var.prefix}-schematics-zone" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -139,7 +139,7 @@ module "cbr_zone_schematics" { module "cbr_rules" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.28.1" + version = "1.29.0" rule_description = "${var.prefix} rule for vpc flow log access to cos" enforcement_mode = "enabled" resources = [{ diff --git a/examples/multiple_mzr_clusters/main.tf b/examples/multiple_mzr_clusters/main.tf index fe1fb29b..c4d1c442 100644 --- a/examples/multiple_mzr_clusters/main.tf +++ b/examples/multiple_mzr_clusters/main.tf @@ -189,7 +189,7 @@ module "observability_instances" { module "observability_agents_1" { source = "terraform-ibm-modules/observability-agents/ibm" - version = "2.3.0" + version = "2.3.3" providers = { helm = helm.helm_cluster_1 } @@ -202,7 +202,7 @@ module "observability_agents_1" { module "observability_agents_2" { source = "terraform-ibm-modules/observability-agents/ibm" - version = "2.3.0" + version = "2.3.3" providers = { helm = helm.helm_cluster_2 } diff --git a/main.tf b/main.tf index 7544f434..f11ec283 100644 --- a/main.tf +++ b/main.tf @@ -87,7 +87,7 @@ module "cos_instance" { count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0 source = "terraform-ibm-modules/cos/ibm" - version = "8.14.4" + version = "8.15.1" cos_instance_name = local.cos_name resource_group_id = var.resource_group_id cos_plan = local.cos_plan @@ -673,7 +673,7 @@ locals { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.28.1" + version = "1.29.0" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts