Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -243,12 +243,12 @@ Optionally, you need the following permissions to attach Access Management tags

| Name | Source | Version |
|------|--------|---------|
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.20 |
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.21 |

### Resources

Expand Down
6 changes: 3 additions & 3 deletions examples/advanced/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ locals {

module "kp_all_inclusive" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
version = "5.0.2"
version = "5.1.2"
key_protect_instance_name = "${var.prefix}-kp-instance"
resource_group_id = module.resource_group.resource_group_id
region = var.region
Expand Down Expand Up @@ -223,7 +223,7 @@ module "observability_instances" {

module "trusted_profile" {
source = "terraform-ibm-modules/trusted-profile/ibm"
version = "2.2.0"
version = "2.3.0"
trusted_profile_name = "${var.prefix}-profile"
trusted_profile_description = "Logs agent Trusted Profile"
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
Expand All @@ -248,7 +248,7 @@ module "trusted_profile" {
module "observability_agents" {
depends_on = [module.kube_audit]
source = "terraform-ibm-modules/observability-agents/ibm"
version = "2.7.0"
version = "2.7.2"
cluster_id = module.ocp_base.cluster_id
cluster_resource_group_id = module.resource_group.resource_group_id
# Cloud Logs agent
Expand Down
2 changes: 1 addition & 1 deletion examples/custom_sg/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ locals {
module "custom_sg" {
for_each = toset(["custom-cluster-sg", "custom-worker-pool-sg", "custom-lb-sg", "custom-master-vpe-sg", "custom-registry-vpe-sg", "custom-kube-api-vpe-sg"])
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
add_ibm_cloud_internal_rules = false
security_group_name = each.key
security_group_rules = []
Expand Down
8 changes: 4 additions & 4 deletions examples/fscloud/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ module "resource_group" {

module "cos_fscloud" {
source = "terraform-ibm-modules/cos/ibm"
version = "8.21.20"
version = "8.21.21"
resource_group_id = module.resource_group.resource_group_id
create_cos_bucket = false
cos_instance_name = "${var.prefix}-cos"
Expand All @@ -30,7 +30,7 @@ module "cos_fscloud" {

module "flowlogs_bucket" {
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
version = "8.21.20"
version = "8.21.21"

bucket_configs = [
{
Expand All @@ -52,7 +52,7 @@ module "flowlogs_bucket" {
module "vpc" {
depends_on = [module.flowlogs_bucket]
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
version = "7.23.5"
version = "7.23.7"
resource_group_id = module.resource_group.resource_group_id
region = var.region
prefix = var.prefix
Expand Down Expand Up @@ -225,7 +225,7 @@ locals {
module "custom_sg" {
for_each = toset(["custom-lb-sg"])
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
add_ibm_cloud_internal_rules = false
security_group_name = each.key
security_group_rules = []
Expand Down
4 changes: 2 additions & 2 deletions examples/multiple_mzr_clusters/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ module "observability_instances" {

module "observability_agents_1" {
source = "terraform-ibm-modules/observability-agents/ibm"
version = "2.7.0"
version = "2.7.2"
providers = {
helm = helm.helm_cluster_1
}
Expand All @@ -201,7 +201,7 @@ module "observability_agents_1" {

module "observability_agents_2" {
source = "terraform-ibm-modules/observability-agents/ibm"
version = "2.7.0"
version = "2.7.2"
providers = {
helm = helm.helm_cluster_2
}
Expand Down
10 changes: 5 additions & 5 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ module "cos_instance" {
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0

source = "terraform-ibm-modules/cos/ibm"
version = "8.21.20"
version = "8.21.21"
cos_instance_name = local.cos_name
resource_group_id = var.resource_group_id
cos_plan = local.cos_plan
Expand Down Expand Up @@ -628,7 +628,7 @@ module "attach_sg_to_lb" {
depends_on = [null_resource.confirm_lb_active]
count = length(var.additional_lb_security_group_ids)
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
existing_security_group_id = var.additional_lb_security_group_ids[count.index]
use_existing_security_group_id = true
target_ids = [for index in range(var.number_of_lbs) : local.lbs_associated_with_cluster[index]] # number_of_lbs is necessary to give a static number of elements to tf to accomplish the apply when the cluster does not initially exists
Expand Down Expand Up @@ -679,7 +679,7 @@ locals {
module "attach_sg_to_master_vpe" {
count = length(var.additional_vpe_security_group_ids["master"])
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
existing_security_group_id = var.additional_vpe_security_group_ids["master"][count.index]
use_existing_security_group_id = true
target_ids = [local.master_vpe_id]
Expand All @@ -688,7 +688,7 @@ module "attach_sg_to_master_vpe" {
module "attach_sg_to_api_vpe" {
count = length(var.additional_vpe_security_group_ids["api"])
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
existing_security_group_id = var.additional_vpe_security_group_ids["api"][count.index]
use_existing_security_group_id = true
target_ids = [local.api_vpe_id]
Expand All @@ -697,7 +697,7 @@ module "attach_sg_to_api_vpe" {
module "attach_sg_to_registry_vpe" {
count = length(var.additional_vpe_security_group_ids["registry"])
source = "terraform-ibm-modules/security-group/ibm"
version = "2.6.2"
version = "2.7.0"
existing_security_group_id = var.additional_vpe_security_group_ids["registry"][count.index]
use_existing_security_group_id = true
target_ids = [local.registry_vpe_id]
Expand Down
2 changes: 1 addition & 1 deletion solutions/fully-configurable/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ The following resources are provisioned by this example:
| <a name="module_existing_cluster_kms_key_crn_parser"></a> [existing\_cluster\_kms\_key\_crn\_parser](#module\_existing\_cluster\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| <a name="module_existing_kms_crn_parser"></a> [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| <a name="module_existing_vpc_crn_parser"></a> [existing\_vpc\_crn\_parser](#module\_existing\_vpc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.2 |
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.2 |
| <a name="module_ocp_base"></a> [ocp\_base](#module\_ocp\_base) | ../.. | n/a |
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |

Expand Down
2 changes: 1 addition & 1 deletion solutions/fully-configurable/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ module "kms" {
}
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
version = "5.0.2"
version = "5.1.2"
create_key_protect_instance = false
region = local.cluster_kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
Expand Down
4 changes: 2 additions & 2 deletions tests/existing-resources/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ module "resource_group" {

module "vpc" {
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
version = "7.23.5"
version = "7.23.7"
resource_group_id = module.resource_group.resource_group_id
region = var.region
name = "vpc"
Expand All @@ -38,7 +38,7 @@ module "vpc" {

module "cos" {
source = "terraform-ibm-modules/cos/ibm"
version = "8.21.20"
version = "8.21.21"
resource_group_id = module.resource_group.resource_group_id
region = var.region
cos_instance_name = "${var.prefix}-cos"
Expand Down