diff --git a/README.md b/README.md index 7690aae0..7afc81c9 100644 --- a/README.md +++ b/README.md @@ -250,7 +250,7 @@ Optionally, you need the following permissions to attach Access Management tags | [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 | | [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 | | [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 | -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.4 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.5 | | [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.25 | | [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 | diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 2ec8037c..20d6182c 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -211,7 +211,7 @@ locals { module "cloud_logs" { source = "terraform-ibm-modules/cloud-logs/ibm" - version = "1.5.11" + version = "1.6.0" resource_group_id = module.resource_group.resource_group_id region = var.region plan = "standard" @@ -245,7 +245,7 @@ module "trusted_profile" { module "logs_agents" { depends_on = [module.kube_audit] source = "terraform-ibm-modules/logs-agent/ibm" - version = "1.1.10" + version = "1.2.0" cluster_id = module.ocp_base.cluster_id cluster_resource_group_id = module.resource_group.resource_group_id logs_agent_trusted_profile_id = module.trusted_profile.trusted_profile.id diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 8c83ef10..2c494ee7 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -52,7 +52,7 @@ module "flowlogs_bucket" { module "vpc" { depends_on = [module.flowlogs_bucket] source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "7.25.11" + version = "7.25.12" resource_group_id = module.resource_group.resource_group_id region = var.region prefix = var.prefix @@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_vpc_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.32.4" + version = "1.32.5" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone representing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -124,7 +124,7 @@ module "cbr_vpc_zone" { module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.32.4" + version = "1.32.5" name = "${var.prefix}-schematics-zone" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -139,7 +139,7 @@ module "cbr_zone_schematics" { module "cbr_rules" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.32.4" + version = "1.32.5" rule_description = "${var.prefix} rule for vpc flow log access to cos" enforcement_mode = "enabled" resources = [{ diff --git a/examples/multiple_mzr_clusters/main.tf b/examples/multiple_mzr_clusters/main.tf index e543f80e..96fd7a6e 100644 --- a/examples/multiple_mzr_clusters/main.tf +++ b/examples/multiple_mzr_clusters/main.tf @@ -173,7 +173,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" { module "monitoring_instance" { source = "terraform-ibm-modules/cloud-monitoring/ibm" - version = "1.5.0" + version = "1.6.0" resource_group_id = module.resource_group.resource_group_id region = var.region plan = "graduated-tier" @@ -190,7 +190,7 @@ module "monitoring_agent_1" { helm = helm.helm_cluster_1 } source = "terraform-ibm-modules/monitoring-agent/ibm" - version = "1.4.1" + version = "1.5.0" cluster_id = module.ocp_base_cluster_1.cluster_id cluster_resource_group_id = module.resource_group.resource_group_id access_key = module.monitoring_instance.access_key @@ -202,7 +202,7 @@ module "monitoring_agent_2" { helm = helm.helm_cluster_2 } source = "terraform-ibm-modules/monitoring-agent/ibm" - version = "1.4.1" + version = "1.5.0" cluster_id = module.ocp_base_cluster_2.cluster_id cluster_resource_group_id = module.resource_group.resource_group_id access_key = module.monitoring_instance.access_key diff --git a/main.tf b/main.tf index 61a68e38..15242246 100644 --- a/main.tf +++ b/main.tf @@ -688,7 +688,7 @@ locals { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.32.4" + version = "1.32.5" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index b0b5e8e1..55bb8885 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -14,7 +14,7 @@ module "resource_group" { module "vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "7.25.11" + version = "7.25.12" resource_group_id = module.resource_group.resource_group_id region = var.region name = "vpc"