diff --git a/README.md b/README.md
index a02ab3cf1..beae5ae42 100644
--- a/README.md
+++ b/README.md
@@ -851,17 +851,17 @@ module "cluster_pattern" {
| Name | Source | Version |
|------|--------|---------|
-| [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 |
-| [cluster](#module\_cluster) | terraform-ibm-modules/base-ocp-vpc/ibm | 3.56.0 |
+| [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 |
+| [cluster](#module\_cluster) | terraform-ibm-modules/base-ocp-vpc/ibm | 3.59.0 |
| [dynamic\_values](#module\_dynamic\_values) | ./dynamic_values | n/a |
-| [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 |
+| [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 |
| [key\_management](#module\_key\_management) | ./kms | n/a |
| [placement\_group\_map](#module\_placement\_group\_map) | ./dynamic_values/config_modules/list_to_map | n/a |
| [ssh\_keys](#module\_ssh\_keys) | ./ssh_key | n/a |
| [teleport\_config](#module\_teleport\_config) | ./teleport_config | n/a |
| [update\_cbr\_vpc\_zone](#module\_update\_cbr\_vpc\_zone) | terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module | 1.33.2 |
-| [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 8.2.2 |
-| [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 |
+| [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 8.3.0 |
+| [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 |
### Resources
diff --git a/bastion_host.tf b/bastion_host.tf
index 3356acf75..9a39ab052 100644
--- a/bastion_host.tf
+++ b/bastion_host.tf
@@ -42,7 +42,7 @@ module "teleport_config" {
module "bastion_host" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
- version = "5.5.4"
+ version = "5.6.1"
for_each = local.bastion_vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true
diff --git a/cluster.tf b/cluster.tf
index e49a717cc..eda0bd0e5 100644
--- a/cluster.tf
+++ b/cluster.tf
@@ -244,7 +244,7 @@ module "cluster" {
if cluster.kube_type == "openshift"
}
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
- version = "3.56.0"
+ version = "3.59.0"
resource_group_id = local.resource_groups[each.value.resource_group]
region = var.region
cluster_name = each.value.cluster_name
diff --git a/common-dev-assets b/common-dev-assets
index 47c0edbc6..325cfd0d9 160000
--- a/common-dev-assets
+++ b/common-dev-assets
@@ -1 +1 @@
-Subproject commit 47c0edbc6d669874511116e4cb645097d10561b9
+Subproject commit 325cfd0d91902e08079644092bbf298c4872f388
diff --git a/f5_vsi.tf b/f5_vsi.tf
index 8098b3206..95550f250 100644
--- a/f5_vsi.tf
+++ b/f5_vsi.tf
@@ -117,7 +117,7 @@ locals {
module "f5_vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
- version = "5.5.4"
+ version = "5.6.1"
for_each = local.f5_vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true
diff --git a/main.tf b/main.tf
index 5157bce05..f7b274625 100644
--- a/main.tf
+++ b/main.tf
@@ -33,7 +33,7 @@ locals {
# Due to existing implicit dependencies we do not think this will be an issue, including auth policies for activity tracker.
module "vpc" {
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
- version = "8.2.2"
+ version = "8.3.0"
for_each = local.vpc_map
name = each.value.prefix
existing_vpc_id = each.value.existing_vpc_id
diff --git a/patterns/vsi-extension/main.tf b/patterns/vsi-extension/main.tf
index 3ee6d02ec..8c9d907e2 100644
--- a/patterns/vsi-extension/main.tf
+++ b/patterns/vsi-extension/main.tf
@@ -44,7 +44,7 @@ locals {
module "vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
- version = "5.5.4"
+ version = "5.6.1"
resource_group_id = data.ibm_is_vpc.vpc_by_id.resource_group
create_security_group = true
prefix = "${var.prefix}-vsi"
diff --git a/tests/go.mod b/tests/go.mod
index 5ae696333..efc362f4f 100644
--- a/tests/go.mod
+++ b/tests/go.mod
@@ -7,7 +7,7 @@ toolchain go1.25.1
require (
github.com/gruntwork-io/terratest v0.50.0
github.com/stretchr/testify v1.11.1
- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5
+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6
)
require (
diff --git a/tests/go.sum b/tests/go.sum
index 5a27199d6..61214f3c5 100644
--- a/tests/go.sum
+++ b/tests/go.sum
@@ -279,8 +279,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5 h1:cFfi7TX7WY67sWdgIvOygAb5U1gwXMXNwhhjS61Ysxw=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE=
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
diff --git a/virtual_servers.tf b/virtual_servers.tf
index db2d3ad31..64ff7c162 100644
--- a/virtual_servers.tf
+++ b/virtual_servers.tf
@@ -41,7 +41,7 @@ data "ibm_is_image" "image" {
module "vsi" {
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
- version = "5.5.4"
+ version = "5.6.1"
for_each = local.vsi_map
resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group]
create_security_group = each.value.security_group == null ? false : true