Skip to content

Commit 80a4afc

Browse files
fix(deps): update dependencies
1 parent 9b089ff commit 80a4afc

File tree

10 files changed

+30
-30
lines changed

10 files changed

+30
-30
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ No modules.
111111
| <a name="input_access_key"></a> [access\_key](#input\_access\_key) | Access key used by the agent to communicate with the instance. Either `access_key` or `existing_access_key_secret_name` is required. This value will be stored in a new secret on the cluster if passed. If you want to use this agent for only metrics or metrics with security and compliance, use a manager key scoped to the IBM Cloud Monitoring instance. If you only want to use the agent for security and compliance use a manager key scoped to the Security and Compliance Center Workload Protection instance. | `string` | `null` | no |
112112
| <a name="input_add_cluster_name"></a> [add\_cluster\_name](#input\_add\_cluster\_name) | If true, configure the agent to associate a tag containing the cluster name. This tag is added in the format `ibm-containers-kubernetes-cluster-name: cluster_name`. | `bool` | `true` | no |
113113
| <a name="input_agent_image_repository"></a> [agent\_image\_repository](#input\_agent\_image\_repository) | The image repository to pull the agent image from. | `string` | `"agent-slim"` | no |
114-
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`. | `string` | `"14.3.0@sha256:281da13df130813a4f00171756046ac969150d36a9b0dd32a817d41502f19fe4"` | no |
114+
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`. | `string` | `"14.3.1@sha256:1055002e0e8f88d62d62ea77a7383d44ef33e79ed6d07d3d6431a810421d30b7"` | no |
115115
| <a name="input_agent_limits_cpu"></a> [agent\_limits\_cpu](#input\_agent\_limits\_cpu) | Specify CPU resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
116116
| <a name="input_agent_limits_memory"></a> [agent\_limits\_memory](#input\_agent\_limits\_memory) | Specify memory resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1024Mi"` | no |
117117
| <a name="input_agent_mode"></a> [agent\_mode](#input\_agent\_mode) | The operational mode for the monitoring agent. [Learn more](https://docs.sysdig.com/en/docs/administration/configure-agent-modes/). | `string` | `null` | no |
@@ -121,13 +121,13 @@ No modules.
121121
| <a name="input_blacklisted_ports"></a> [blacklisted\_ports](#input\_blacklisted\_ports) | To block network traffic and metrics from network ports, pass the list of ports from which you want to filter out any data. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_agent#ports | `list(number)` | `[]` | no |
122122
| <a name="input_chart"></a> [chart](#input\_chart) | The name of the Helm chart to deploy. Use `chart_location` to specify helm chart location. | `string` | `"sysdig-deploy"` | no |
123123
| <a name="input_chart_location"></a> [chart\_location](#input\_chart\_location) | The location of the agent helm chart. | `string` | `"https://charts.sysdig.com"` | no |
124-
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.99.3"` | no |
124+
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.99.5"` | no |
125125
| <a name="input_cluster_config_endpoint_type"></a> [cluster\_config\_endpoint\_type](#input\_cluster\_config\_endpoint\_type) | Specify which type of endpoint to use for for cluster config access: 'default', 'private', 'vpe', 'link'. 'default' value will use the default endpoint of the cluster. | `string` | `"default"` | no |
126126
| <a name="input_cluster_id"></a> [cluster\_id](#input\_cluster\_id) | The ID of the cluster you wish to deploy the agent in. | `string` | n/a | yes |
127127
| <a name="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id) | The resource group ID of the cluster. | `string` | n/a | yes |
128128
| <a name="input_cluster_shield_deploy"></a> [cluster\_shield\_deploy](#input\_cluster\_shield\_deploy) | Deploy the Cluster Shield component to provide runtime detection and policy enforcement for Kubernetes workloads. If enabled, a Kubernetes Deployment will be deployed to your cluster using helm. | `bool` | `true` | no |
129129
| <a name="input_cluster_shield_image_repository"></a> [cluster\_shield\_image\_repository](#input\_cluster\_shield\_image\_repository) | The image repository to pull the Cluster Shield image from. | `string` | `"cluster-shield"` | no |
130-
| <a name="input_cluster_shield_image_tag_digest"></a> [cluster\_shield\_image\_tag\_digest](#input\_cluster\_shield\_image\_tag\_digest) | The image tag or digest to pull for the Cluster Shield component. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. | `string` | `"1.18.0@sha256:7483541416442fd5b81bdf2f6cc7905a9ae9f3e696929247e3b18889476d54df"` | no |
130+
| <a name="input_cluster_shield_image_tag_digest"></a> [cluster\_shield\_image\_tag\_digest](#input\_cluster\_shield\_image\_tag\_digest) | The image tag or digest to pull for the Cluster Shield component. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. | `string` | `"1.18.1@sha256:468b5b2347919c9e872996a876aff785663283d5fffbcd08629cf6011b35afc3"` | no |
131131
| <a name="input_cluster_shield_limits_cpu"></a> [cluster\_shield\_limits\_cpu](#input\_cluster\_shield\_limits\_cpu) | Specify CPU resource limits for the cluster shield pods. | `string` | `"1500m"` | no |
132132
| <a name="input_cluster_shield_limits_memory"></a> [cluster\_shield\_limits\_memory](#input\_cluster\_shield\_limits\_memory) | Specify memory resource limits for the cluster shield pods. | `string` | `"1536Mi"` | no |
133133
| <a name="input_cluster_shield_requests_cpu"></a> [cluster\_shield\_requests\_cpu](#input\_cluster\_shield\_requests\_cpu) | Specify CPU resource requests for the cluster shield pods. | `string` | `"500m"` | no |
@@ -144,7 +144,7 @@ No modules.
144144
| <a name="input_image_registry_namespace"></a> [image\_registry\_namespace](#input\_image\_registry\_namespace) | The namespace within the image registry to pull all images from. | `string` | `"ext/sysdig"` | no |
145145
| <a name="input_instance_region"></a> [instance\_region](#input\_instance\_region) | The region of the IBM Cloud Monitoring instance that you want to send metrics to. The region value is used to construct the ingestion and api endpoints. If you are only using the agent for security and compliance monitoring, set this to the region of your IBM Cloud Security and Compliance Center Workload Protection instance. If you have both Cloud Monitoring and Security and Compliance Center Workload Protection instances, the instances must be connected and must be in the same region to use the same agent. | `string` | n/a | yes |
146146
| <a name="input_is_vpc_cluster"></a> [is\_vpc\_cluster](#input\_is\_vpc\_cluster) | Specify true if the target cluster is a VPC cluster, false if it is a classic cluster. | `bool` | `true` | no |
147-
| <a name="input_kernel_module_image_digest"></a> [kernel\_module\_image\_digest](#input\_kernel\_module\_image\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported. | `string` | `"14.3.0@sha256:dd3279359d296e5e210ecca1287a8da3bf43d9fbb396f519bc7ec14f9126bf52"` | no |
147+
| <a name="input_kernel_module_image_digest"></a> [kernel\_module\_image\_digest](#input\_kernel\_module\_image\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported. | `string` | `"14.3.1@sha256:b7f7354d04850b7fe0cd58a9218c60070575a2946e986c6709b57f46a1b15069"` | no |
148148
| <a name="input_kernel_module_image_repository"></a> [kernel\_module\_image\_repository](#input\_kernel\_module\_image\_repository) | The image repository to pull the agent kernel module initContainer image from. | `string` | `"agent-kmodule"` | no |
149149
| <a name="input_max_surge"></a> [max\_surge](#input\_max\_surge) | The number of pods that can be created above the desired amount of daemonset pods during an update. If `max_surge` is set to null, the `max_surge` setting is ignored. The variable accepts absolute number or percentage value(e.g., '1' or '10%'). | `string` | `null` | no |
150150
| <a name="input_max_unavailable"></a> [max\_unavailable](#input\_max\_unavailable) | The maximum number of pods that can be unavailable during a DaemonSet rolling update. Accepts absolute number or percentage (e.g., '1' or '10%'). | `string` | `"1"` | no |

examples/obs-agent-iks/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.6"
7+
version = "1.4.7"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -108,7 +108,7 @@ resource "time_sleep" "wait_operators" {
108108

109109
module "cloud_monitoring" {
110110
source = "terraform-ibm-modules/cloud-monitoring/ibm"
111-
version = "1.12.1"
111+
version = "1.12.2"
112112
instance_name = "${var.prefix}-cloud-monitoring"
113113
resource_group_id = module.resource_group.resource_group_id
114114
resource_tags = var.resource_tags
@@ -122,7 +122,7 @@ module "cloud_monitoring" {
122122

123123
module "scc_wp" {
124124
source = "terraform-ibm-modules/scc-workload-protection/ibm"
125-
version = "1.16.5"
125+
version = "1.16.7"
126126
name = "${var.prefix}-scc-wp"
127127
resource_group_id = module.resource_group.resource_group_id
128128
region = var.region

examples/obs-agent-ocp/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.6"
7+
version = "1.4.7"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -71,7 +71,7 @@ locals {
7171

7272
module "ocp_base" {
7373
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
74-
version = "3.75.3"
74+
version = "3.75.5"
7575
resource_group_id = module.resource_group.resource_group_id
7676
region = var.region
7777
tags = var.resource_tags
@@ -95,7 +95,7 @@ data "ibm_container_cluster_config" "cluster_config" {
9595

9696
module "cloud_monitoring" {
9797
source = "terraform-ibm-modules/cloud-monitoring/ibm"
98-
version = "1.12.1"
98+
version = "1.12.2"
9999
instance_name = "${var.prefix}-cloud-monitoring"
100100
resource_group_id = module.resource_group.resource_group_id
101101
resource_tags = var.resource_tags
@@ -109,7 +109,7 @@ module "cloud_monitoring" {
109109

110110
module "scc_wp" {
111111
source = "terraform-ibm-modules/scc-workload-protection/ibm"
112-
version = "1.16.5"
112+
version = "1.16.7"
113113
name = "${var.prefix}-scc-wp"
114114
resource_group_id = module.resource_group.resource_group_id
115115
region = var.region

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ locals {
1616

1717
module "instance_crn_parser" {
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.5"
19+
version = "1.3.7"
2020
crn = var.instance_crn
2121
}
2222

solutions/fully-configurable/variables.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ variable "chart_version" {
186186
description = "The version of the agent helm chart to deploy."
187187
type = string
188188
# This version is automatically managed by renovate automation - do not remove the registryUrl comment on next line
189-
default = "1.99.3" # registryUrl: charts.sysdig.com
189+
default = "1.99.5" # registryUrl: charts.sysdig.com
190190
nullable = false
191191
}
192192

@@ -215,15 +215,15 @@ variable "agent_image_tag_digest" {
215215
description = "The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`."
216216
type = string
217217
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
218-
default = "14.3.0@sha256:281da13df130813a4f00171756046ac969150d36a9b0dd32a817d41502f19fe4" # datasource: icr.io/ext/sysdig/agent-slim
218+
default = "14.3.1@sha256:1055002e0e8f88d62d62ea77a7383d44ef33e79ed6d07d3d6431a810421d30b7" # datasource: icr.io/ext/sysdig/agent-slim
219219
nullable = false
220220
}
221221

222222
variable "kernel_module_image_digest" {
223223
description = "The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported."
224224
type = string
225225
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
226-
default = "14.3.0@sha256:dd3279359d296e5e210ecca1287a8da3bf43d9fbb396f519bc7ec14f9126bf52" # datasource: icr.io/ext/sysdig/agent-kmodule
226+
default = "14.3.1@sha256:b7f7354d04850b7fe0cd58a9218c60070575a2946e986c6709b57f46a1b15069" # datasource: icr.io/ext/sysdig/agent-kmodule
227227
nullable = false
228228
validation {
229229
condition = can(regex("^\\d+\\.\\d+\\.\\d+@sha256:[a-f0-9]{64}$", var.kernel_module_image_digest))
@@ -388,7 +388,7 @@ variable "cluster_shield_image_tag_digest" {
388388
description = "The image tag or digest to pull for the Cluster Shield component. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`."
389389
type = string
390390
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
391-
default = "1.18.0@sha256:7483541416442fd5b81bdf2f6cc7905a9ae9f3e696929247e3b18889476d54df" # datasource: icr.io/ext/sysdig/cluster-shield
391+
default = "1.18.1@sha256:468b5b2347919c9e872996a876aff785663283d5fffbcd08629cf6011b35afc3" # datasource: icr.io/ext/sysdig/cluster-shield
392392
}
393393

394394
variable "cluster_shield_image_repository" {

tests/go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ go 1.25.5
55
require (
66
github.com/gruntwork-io/terratest v0.54.0
77
github.com/stretchr/testify v1.11.1
8-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0
8+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1
99
)
1010

1111
require (
@@ -35,7 +35,7 @@ require (
3535
github.com/go-logr/logr v1.4.2 // indirect
3636
github.com/go-logr/stdr v1.2.2 // indirect
3737
github.com/go-openapi/analysis v0.23.0 // indirect
38-
github.com/go-openapi/errors v0.22.5 // indirect
38+
github.com/go-openapi/errors v0.22.6 // indirect
3939
github.com/go-openapi/jsonpointer v0.21.1 // indirect
4040
github.com/go-openapi/jsonreference v0.21.0 // indirect
4141
github.com/go-openapi/loads v0.22.0 // indirect

tests/go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ github.com/go-openapi/analysis v0.23.0 h1:aGday7OWupfMs+LbmLZG4k0MYXIANxcuBTYUC0
8383
github.com/go-openapi/analysis v0.23.0/go.mod h1:9mz9ZWaSlV8TvjQHLl2mUW2PbZtemkE8yA5v22ohupo=
8484
github.com/go-openapi/errors v0.19.8/go.mod h1:cM//ZKUKyO06HSwqAelJ5NsEMMcpa6VpXe8DOa1Mi1M=
8585
github.com/go-openapi/errors v0.20.3/go.mod h1:Z3FlZ4I8jEGxjUK+bugx3on2mIAk4txuAOhlsB1FSgk=
86-
github.com/go-openapi/errors v0.22.5 h1:Yfv4O/PRYpNF3BNmVkEizcHb3uLVVsrDt3LNdgAKRY4=
87-
github.com/go-openapi/errors v0.22.5/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk=
86+
github.com/go-openapi/errors v0.22.6 h1:eDxcf89O8odEnohIXwEjY1IB4ph5vmbUsBMsFNwXWPo=
87+
github.com/go-openapi/errors v0.22.6/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk=
8888
github.com/go-openapi/jsonpointer v0.21.1 h1:whnzv/pNXtK2FbX/W9yJfRmE2gsmkfahjMKB0fZvcic=
8989
github.com/go-openapi/jsonpointer v0.21.1/go.mod h1:50I1STOfbY1ycR8jGz8DaMeLCdXiI6aDteEdRNNzpdk=
9090
github.com/go-openapi/jsonreference v0.21.0 h1:Rs+Y7hSXT83Jacb7kFyjn4ijOuVGSvOdF2+tg1TRrwQ=
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
298298
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
299299
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
300-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0 h1:uaGN3RMlOpmkqCXPjlygPiCqnGhszYP6YU3rWWsp0wc=
301-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0/go.mod h1:HqX0S0Ue19y7TJRGR5+Np2Aq0xElgw3mM3zZCWwQc1I=
300+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1 h1:DTEreyr7dQQdAp36UbdjiZBS8C6BxVn9kpvR3ZqcV5s=
301+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1/go.mod h1:ZAjHMb7i4CWS+jiFbnbMGVBKMj9i6B4XmC6js94XlF4=
302302
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
303303
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
304304
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=

tests/resources/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.6"
7+
version = "1.4.7"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -71,7 +71,7 @@ locals {
7171

7272
module "ocp_base" {
7373
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
74-
version = "3.75.3"
74+
version = "3.75.5"
7575
resource_group_id = module.resource_group.resource_group_id
7676
region = var.region
7777
tags = var.resource_tags
@@ -90,7 +90,7 @@ module "ocp_base" {
9090

9191
module "cloud_monitoring" {
9292
source = "terraform-ibm-modules/cloud-monitoring/ibm"
93-
version = "1.12.1"
93+
version = "1.12.2"
9494
instance_name = "${var.prefix}-cloud-monitoring"
9595
resource_group_id = module.resource_group.resource_group_id
9696
resource_tags = var.resource_tags

0 commit comments

Comments
 (0)