diff --git a/README.md b/README.md
index 2edab370..3fdd1837 100644
--- a/README.md
+++ b/README.md
@@ -247,8 +247,8 @@ Optionally, you need the following permissions to attach Access Management tags
| [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
-| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29.0 |
-| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.8 |
+| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30.0 |
+| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.9 |
### Resources
diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index 99949873..c2cb9bf6 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -211,7 +211,7 @@ locals {
module "observability_instances" {
source = "terraform-ibm-modules/observability-instances/ibm"
- version = "3.4.3"
+ version = "3.5.0"
resource_group_id = module.resource_group.resource_group_id
region = var.region
cloud_logs_plan = "standard"
@@ -223,7 +223,7 @@ module "observability_instances" {
module "trusted_profile" {
source = "terraform-ibm-modules/trusted-profile/ibm"
- version = "2.0.1"
+ version = "2.1.1"
trusted_profile_name = "${var.prefix}-profile"
trusted_profile_description = "Logs agent Trusted Profile"
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
@@ -248,7 +248,7 @@ module "trusted_profile" {
module "observability_agents" {
depends_on = [module.kube_audit]
source = "terraform-ibm-modules/observability-agents/ibm"
- version = "2.6.0"
+ version = "2.6.2"
cluster_id = module.ocp_base.cluster_id
cluster_resource_group_id = module.resource_group.resource_group_id
# Cloud Logs agent
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index 8bbeb0f1..bf9ed2c3 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos_fscloud" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.9"
resource_group_id = module.resource_group.resource_group_id
create_cos_bucket = false
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
module "flowlogs_bucket" {
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
- version = "8.21.8"
+ version = "8.21.9"
bucket_configs = [
{
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
module "cbr_vpc_zone" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.29.0"
+ version = "1.30.0"
name = "${var.prefix}-VPC-network-zone"
zone_description = "CBR Network zone representing VPC"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
module "cbr_zone_schematics" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.29.0"
+ version = "1.30.0"
name = "${var.prefix}-schematics-zone"
zone_description = "CBR Network zone containing Schematics"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
module "cbr_rules" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.29.0"
+ version = "1.30.0"
rule_description = "${var.prefix} rule for vpc flow log access to cos"
enforcement_mode = "enabled"
resources = [{
diff --git a/main.tf b/main.tf
index ecfc16cb..a8d2a118 100644
--- a/main.tf
+++ b/main.tf
@@ -108,7 +108,7 @@ module "cos_instance" {
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.9"
cos_instance_name = local.cos_name
resource_group_id = var.resource_group_id
cos_plan = local.cos_plan
@@ -718,7 +718,7 @@ locals {
module "cbr_rule" {
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.29.0"
+ version = "1.30.0"
rule_description = var.cbr_rules[count.index].description
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
rule_contexts = var.cbr_rules[count.index].rule_contexts
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index 207af61b..42702100 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -38,7 +38,7 @@ module "vpc" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.9"
resource_group_id = module.resource_group.resource_group_id
region = var.region
cos_instance_name = "${var.prefix}-cos"