diff --git a/README.md b/README.md index 2edab370..3fdd1837 100644 --- a/README.md +++ b/README.md @@ -247,8 +247,8 @@ Optionally, you need the following permissions to attach Access Management tags | [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29.0 | -| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.8 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30.0 | +| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.9 | ### Resources diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 99949873..c2cb9bf6 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -211,7 +211,7 @@ locals { module "observability_instances" { source = "terraform-ibm-modules/observability-instances/ibm" - version = "3.4.3" + version = "3.5.0" resource_group_id = module.resource_group.resource_group_id region = var.region cloud_logs_plan = "standard" @@ -223,7 +223,7 @@ module "observability_instances" { module "trusted_profile" { source = "terraform-ibm-modules/trusted-profile/ibm" - version = "2.0.1" + version = "2.1.1" trusted_profile_name = "${var.prefix}-profile" trusted_profile_description = "Logs agent Trusted Profile" # As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs. @@ -248,7 +248,7 @@ module "trusted_profile" { module "observability_agents" { depends_on = [module.kube_audit] source = "terraform-ibm-modules/observability-agents/ibm" - version = "2.6.0" + version = "2.6.2" cluster_id = module.ocp_base.cluster_id cluster_resource_group_id = module.resource_group.resource_group_id # Cloud Logs agent diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 8bbeb0f1..bf9ed2c3 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos_fscloud" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.8" + version = "8.21.9" resource_group_id = module.resource_group.resource_group_id create_cos_bucket = false cos_instance_name = "${var.prefix}-cos" @@ -30,7 +30,7 @@ module "cos_fscloud" { module "flowlogs_bucket" { source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.21.8" + version = "8.21.9" bucket_configs = [ { @@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_vpc_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.29.0" + version = "1.30.0" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone representing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -124,7 +124,7 @@ module "cbr_vpc_zone" { module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.29.0" + version = "1.30.0" name = "${var.prefix}-schematics-zone" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -139,7 +139,7 @@ module "cbr_zone_schematics" { module "cbr_rules" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.29.0" + version = "1.30.0" rule_description = "${var.prefix} rule for vpc flow log access to cos" enforcement_mode = "enabled" resources = [{ diff --git a/main.tf b/main.tf index ecfc16cb..a8d2a118 100644 --- a/main.tf +++ b/main.tf @@ -108,7 +108,7 @@ module "cos_instance" { count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0 source = "terraform-ibm-modules/cos/ibm" - version = "8.21.8" + version = "8.21.9" cos_instance_name = local.cos_name resource_group_id = var.resource_group_id cos_plan = local.cos_plan @@ -718,7 +718,7 @@ locals { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.29.0" + version = "1.30.0" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 207af61b..42702100 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -38,7 +38,7 @@ module "vpc" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.8" + version = "8.21.9" resource_group_id = module.resource_group.resource_group_id region = var.region cos_instance_name = "${var.prefix}-cos"