diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index e5fd3f8f..20fa98de 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -22,7 +22,7 @@ locals { module "kp_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.14" + version = "5.1.16" key_protect_instance_name = "${var.prefix}-kp-instance" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -211,7 +211,7 @@ locals { module "cloud_logs" { source = "terraform-ibm-modules/cloud-logs/ibm" - version = "1.6.1" + version = "1.6.3" resource_group_id = module.resource_group.resource_group_id region = var.region plan = "standard" diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 347eb93a..b391b760 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -95,7 +95,7 @@ module "kms" { } count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0 source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.14" + version = "5.1.16" create_key_protect_instance = false region = local.cluster_kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -277,7 +277,7 @@ module "secret_group" { } count = var.enable_secrets_manager_integration && var.secrets_manager_secret_group_id == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.11" + version = "1.3.12" region = module.existing_secrets_manager_instance_parser[0].region secrets_manager_guid = module.existing_secrets_manager_instance_parser[0].service_instance secret_group_name = module.ocp_base.cluster_id