diff --git a/README.md b/README.md
index 7690aae0..7afc81c9 100644
--- a/README.md
+++ b/README.md
@@ -250,7 +250,7 @@ Optionally, you need the following permissions to attach Access Management tags
| [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
| [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
-| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.4 |
+| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.5 |
| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.25 |
| [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index 2ec8037c..20d6182c 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -211,7 +211,7 @@ locals {
module "cloud_logs" {
source = "terraform-ibm-modules/cloud-logs/ibm"
- version = "1.5.11"
+ version = "1.6.0"
resource_group_id = module.resource_group.resource_group_id
region = var.region
plan = "standard"
@@ -245,7 +245,7 @@ module "trusted_profile" {
module "logs_agents" {
depends_on = [module.kube_audit]
source = "terraform-ibm-modules/logs-agent/ibm"
- version = "1.1.10"
+ version = "1.2.0"
cluster_id = module.ocp_base.cluster_id
cluster_resource_group_id = module.resource_group.resource_group_id
logs_agent_trusted_profile_id = module.trusted_profile.trusted_profile.id
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index 8c83ef10..2c494ee7 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -52,7 +52,7 @@ module "flowlogs_bucket" {
module "vpc" {
depends_on = [module.flowlogs_bucket]
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
- version = "7.25.11"
+ version = "7.25.12"
resource_group_id = module.resource_group.resource_group_id
region = var.region
prefix = var.prefix
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
module "cbr_vpc_zone" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.32.4"
+ version = "1.32.5"
name = "${var.prefix}-VPC-network-zone"
zone_description = "CBR Network zone representing VPC"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
module "cbr_zone_schematics" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.32.4"
+ version = "1.32.5"
name = "${var.prefix}-schematics-zone"
zone_description = "CBR Network zone containing Schematics"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
module "cbr_rules" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.32.4"
+ version = "1.32.5"
rule_description = "${var.prefix} rule for vpc flow log access to cos"
enforcement_mode = "enabled"
resources = [{
diff --git a/examples/multiple_mzr_clusters/main.tf b/examples/multiple_mzr_clusters/main.tf
index e543f80e..96fd7a6e 100644
--- a/examples/multiple_mzr_clusters/main.tf
+++ b/examples/multiple_mzr_clusters/main.tf
@@ -173,7 +173,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
module "monitoring_instance" {
source = "terraform-ibm-modules/cloud-monitoring/ibm"
- version = "1.5.0"
+ version = "1.6.0"
resource_group_id = module.resource_group.resource_group_id
region = var.region
plan = "graduated-tier"
@@ -190,7 +190,7 @@ module "monitoring_agent_1" {
helm = helm.helm_cluster_1
}
source = "terraform-ibm-modules/monitoring-agent/ibm"
- version = "1.4.1"
+ version = "1.5.0"
cluster_id = module.ocp_base_cluster_1.cluster_id
cluster_resource_group_id = module.resource_group.resource_group_id
access_key = module.monitoring_instance.access_key
@@ -202,7 +202,7 @@ module "monitoring_agent_2" {
helm = helm.helm_cluster_2
}
source = "terraform-ibm-modules/monitoring-agent/ibm"
- version = "1.4.1"
+ version = "1.5.0"
cluster_id = module.ocp_base_cluster_2.cluster_id
cluster_resource_group_id = module.resource_group.resource_group_id
access_key = module.monitoring_instance.access_key
diff --git a/main.tf b/main.tf
index 61a68e38..15242246 100644
--- a/main.tf
+++ b/main.tf
@@ -688,7 +688,7 @@ locals {
module "cbr_rule" {
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.32.4"
+ version = "1.32.5"
rule_description = var.cbr_rules[count.index].description
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
rule_contexts = var.cbr_rules[count.index].rule_contexts
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index b0b5e8e1..55bb8885 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -14,7 +14,7 @@ module "resource_group" {
module "vpc" {
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
- version = "7.25.11"
+ version = "7.25.12"
resource_group_id = module.resource_group.resource_group_id
region = var.region
name = "vpc"