Skip to content

Commit 18c24b6

Browse files
terraform-ibm-modules-opsSteve Peggs
andauthored
chore(deps): update terraform-module (#94)
* chore(deps): update terraform-module * fix: inputs and outputs on kms * SKIP UPGRADE TEST --------- Co-authored-by: Steve Peggs <[email protected]>
1 parent 921a233 commit 18c24b6

File tree

1 file changed

+13
-4
lines changed

1 file changed

+13
-4
lines changed

examples/complete/main.tf

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,23 @@ module "resource_group" {
2020

2121
module "key_protect_all_inclusive" {
2222
source = "terraform-ibm-modules/key-protect-all-inclusive/ibm"
23-
version = "4.4.2"
23+
version = "4.6.0"
2424
resource_group_id = module.resource_group.resource_group_id
2525
# Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626
# Note: Database instance and Key Protect must be created on the same region.
2727
region = var.region
2828
key_protect_instance_name = "${var.prefix}-kp"
2929
resource_tags = var.resource_tags
30-
key_map = { "icd" = ["${var.prefix}-elasticsearch"] }
30+
keys = [
31+
{
32+
key_ring_name = "icd"
33+
keys = [
34+
{
35+
key_name = "${var.prefix}-elasticsearch"
36+
}
37+
]
38+
}
39+
]
3140
}
3241

3342
##############################################################################
@@ -44,7 +53,7 @@ module "icd_elasticsearch" {
4453
access_tags = var.access_tags
4554
admin_pass = var.admin_pass
4655
users = var.users
47-
existing_kms_instance_guid = module.key_protect_all_inclusive.key_protect_guid
56+
existing_kms_instance_guid = module.key_protect_all_inclusive.kms_guid
4857
service_credential_names = var.service_credential_names
4958
elasticsearch_version = var.elasticsearch_version
5059
kms_key_crn = module.key_protect_all_inclusive.keys["icd.${var.prefix}-elasticsearch"].crn
@@ -80,7 +89,7 @@ resource "elasticsearch_cluster_settings" "global" {
8089
# Create Secrets Manager Instance (if not using existing one)
8190
module "secrets_manager" {
8291
source = "terraform-ibm-modules/secrets-manager/ibm"
83-
version = "1.1.0"
92+
version = "1.1.2"
8493
resource_group_id = module.resource_group.resource_group_id
8594
region = var.region
8695
secrets_manager_name = "${var.prefix}-secrets-manager"

0 commit comments

Comments
 (0)