Skip to content

Commit ed6add1

Browse files
fix(deps): update dependencies
1 parent cf5c715 commit ed6add1

File tree

13 files changed

+55
-57
lines changed

13 files changed

+55
-57
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].0
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].1
1212
secrets: inherit

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].0
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].1
1212
secrets: inherit

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ No modules.
111111
| <a name="input_access_key"></a> [access\_key](#input\_access\_key) | Access key used by the agent to communicate with the instance. Either `access_key` or `existing_access_key_secret_name` is required. This value will be stored in a new secret on the cluster if passed. If you want to use this agent for only metrics or metrics with security and compliance, use a manager key scoped to the IBM Cloud Monitoring instance. If you only want to use the agent for security and compliance use a manager key scoped to the Security and Compliance Center Workload Protection instance. | `string` | `null` | no |
112112
| <a name="input_add_cluster_name"></a> [add\_cluster\_name](#input\_add\_cluster\_name) | If true, configure the agent to associate a tag containing the cluster name. This tag is added in the format `ibm-containers-kubernetes-cluster-name: cluster_name`. | `bool` | `true` | no |
113113
| <a name="input_agent_image_repository"></a> [agent\_image\_repository](#input\_agent\_image\_repository) | The image repository to pull the agent image from. | `string` | `"agent-slim"` | no |
114-
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`. | `string` | `"14.2.5@sha256:64b9d77bbd1bb22f97a74198144dcfea62bb5cee7629091252694e9040058035"` | no |
114+
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`. | `string` | `"14.3.0@sha256:281da13df130813a4f00171756046ac969150d36a9b0dd32a817d41502f19fe4"` | no |
115115
| <a name="input_agent_limits_cpu"></a> [agent\_limits\_cpu](#input\_agent\_limits\_cpu) | Specify CPU resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
116116
| <a name="input_agent_limits_memory"></a> [agent\_limits\_memory](#input\_agent\_limits\_memory) | Specify memory resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1024Mi"` | no |
117117
| <a name="input_agent_mode"></a> [agent\_mode](#input\_agent\_mode) | The operational mode for the monitoring agent. [Learn more](https://docs.sysdig.com/en/docs/administration/configure-agent-modes/). | `string` | `null` | no |
@@ -121,7 +121,7 @@ No modules.
121121
| <a name="input_blacklisted_ports"></a> [blacklisted\_ports](#input\_blacklisted\_ports) | To block network traffic and metrics from network ports, pass the list of ports from which you want to filter out any data. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_agent#ports | `list(number)` | `[]` | no |
122122
| <a name="input_chart"></a> [chart](#input\_chart) | The name of the Helm chart to deploy. Use `chart_location` to specify helm chart location. | `string` | `"sysdig-deploy"` | no |
123123
| <a name="input_chart_location"></a> [chart\_location](#input\_chart\_location) | The location of the agent helm chart. | `string` | `"https://charts.sysdig.com"` | no |
124-
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.98.1"` | no |
124+
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.99.1"` | no |
125125
| <a name="input_cluster_config_endpoint_type"></a> [cluster\_config\_endpoint\_type](#input\_cluster\_config\_endpoint\_type) | Specify which type of endpoint to use for for cluster config access: 'default', 'private', 'vpe', 'link'. 'default' value will use the default endpoint of the cluster. | `string` | `"default"` | no |
126126
| <a name="input_cluster_id"></a> [cluster\_id](#input\_cluster\_id) | The ID of the cluster you wish to deploy the agent in. | `string` | n/a | yes |
127127
| <a name="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id) | The resource group ID of the cluster. | `string` | n/a | yes |
@@ -144,7 +144,7 @@ No modules.
144144
| <a name="input_image_registry_namespace"></a> [image\_registry\_namespace](#input\_image\_registry\_namespace) | The namespace within the image registry to pull all images from. | `string` | `"ext/sysdig"` | no |
145145
| <a name="input_instance_region"></a> [instance\_region](#input\_instance\_region) | The region of the IBM Cloud Monitoring instance that you want to send metrics to. The region value is used to construct the ingestion and api endpoints. If you are only using the agent for security and compliance monitoring, set this to the region of your IBM Cloud Security and Compliance Center Workload Protection instance. If you have both Cloud Monitoring and Security and Compliance Center Workload Protection instances, the instances must be connected and must be in the same region to use the same agent. | `string` | n/a | yes |
146146
| <a name="input_is_vpc_cluster"></a> [is\_vpc\_cluster](#input\_is\_vpc\_cluster) | Specify true if the target cluster is a VPC cluster, false if it is a classic cluster. | `bool` | `true` | no |
147-
| <a name="input_kernel_module_image_digest"></a> [kernel\_module\_image\_digest](#input\_kernel\_module\_image\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported. | `string` | `"14.2.5@sha256:0345968a77f8eb64a00f2b06af3c40bf3df78d34125b46c9788a9e73f8ddbb1a"` | no |
147+
| <a name="input_kernel_module_image_digest"></a> [kernel\_module\_image\_digest](#input\_kernel\_module\_image\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported. | `string` | `"14.3.0@sha256:dd3279359d296e5e210ecca1287a8da3bf43d9fbb396f519bc7ec14f9126bf52"` | no |
148148
| <a name="input_kernel_module_image_repository"></a> [kernel\_module\_image\_repository](#input\_kernel\_module\_image\_repository) | The image repository to pull the agent kernel module initContainer image from. | `string` | `"agent-kmodule"` | no |
149149
| <a name="input_max_surge"></a> [max\_surge](#input\_max\_surge) | The number of pods that can be created above the desired amount of daemonset pods during an update. If `max_surge` is set to null, the `max_surge` setting is ignored. The variable accepts absolute number or percentage value(e.g., '1' or '10%'). | `string` | `null` | no |
150150
| <a name="input_max_unavailable"></a> [max\_unavailable](#input\_max\_unavailable) | The maximum number of pods that can be unavailable during a DaemonSet rolling update. Accepts absolute number or percentage (e.g., '1' or '10%'). | `string` | `"1"` | no |

examples/obs-agent-iks/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.6"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -122,7 +122,7 @@ module "cloud_monitoring" {
122122

123123
module "scc_wp" {
124124
source = "terraform-ibm-modules/scc-workload-protection/ibm"
125-
version = "1.16.4"
125+
version = "1.16.5"
126126
name = "${var.prefix}-scc-wp"
127127
resource_group_id = module.resource_group.resource_group_id
128128
region = var.region

examples/obs-agent-ocp/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.6"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -71,7 +71,7 @@ locals {
7171

7272
module "ocp_base" {
7373
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
74-
version = "3.73.5"
74+
version = "3.75.3"
7575
resource_group_id = module.resource_group.resource_group_id
7676
region = var.region
7777
tags = var.resource_tags
@@ -109,7 +109,7 @@ module "cloud_monitoring" {
109109

110110
module "scc_wp" {
111111
source = "terraform-ibm-modules/scc-workload-protection/ibm"
112-
version = "1.16.4"
112+
version = "1.16.5"
113113
name = "${var.prefix}-scc-wp"
114114
resource_group_id = module.resource_group.resource_group_id
115115
region = var.region

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ locals {
1616

1717
module "instance_crn_parser" {
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.5"
2020
crn = var.instance_crn
2121
}
2222

solutions/fully-configurable/variables.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ variable "chart_version" {
186186
description = "The version of the agent helm chart to deploy."
187187
type = string
188188
# This version is automatically managed by renovate automation - do not remove the registryUrl comment on next line
189-
default = "1.98.1" # registryUrl: charts.sysdig.com
189+
default = "1.99.1" # registryUrl: charts.sysdig.com
190190
nullable = false
191191
}
192192

@@ -215,15 +215,15 @@ variable "agent_image_tag_digest" {
215215
description = "The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `kernel_module_image_digest`."
216216
type = string
217217
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
218-
default = "14.2.5@sha256:64b9d77bbd1bb22f97a74198144dcfea62bb5cee7629091252694e9040058035" # datasource: icr.io/ext/sysdig/agent-slim
218+
default = "14.3.0@sha256:281da13df130813a4f00171756046ac969150d36a9b0dd32a817d41502f19fe4" # datasource: icr.io/ext/sysdig/agent-slim
219219
nullable = false
220220
}
221221

222222
variable "kernel_module_image_digest" {
223223
description = "The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`. This version must match the version being used in the `agent_image_tag_digest`. Note: Only digest format is supported; image tag is not supported."
224224
type = string
225225
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
226-
default = "14.2.5@sha256:0345968a77f8eb64a00f2b06af3c40bf3df78d34125b46c9788a9e73f8ddbb1a" # datasource: icr.io/ext/sysdig/agent-kmodule
226+
default = "14.3.0@sha256:dd3279359d296e5e210ecca1287a8da3bf43d9fbb396f519bc7ec14f9126bf52" # datasource: icr.io/ext/sysdig/agent-kmodule
227227
nullable = false
228228
validation {
229229
condition = can(regex("^\\d+\\.\\d+\\.\\d+@sha256:[a-f0-9]{64}$", var.kernel_module_image_digest))

solutions/fully-configurable/version.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ terraform {
66
# Lock DA into an exact provider version - renovate automation will keep it updated
77
ibm = {
88
source = "ibm-cloud/ibm"
9-
version = "1.85.0"
9+
version = "1.86.1"
1010
}
1111
helm = {
1212
source = "hashicorp/helm"
1313
version = "3.1.1"
1414
}
1515
kubernetes = {
1616
source = "hashicorp/kubernetes"
17-
version = "2.38.0"
17+
version = "3.0.1"
1818
}
1919
}
2020
}

tests/go.mod

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,20 @@
11
module github.com/terraform-ibm-modules/terraform-ibm-monitoring-agent
22

3-
go 1.24.0
4-
5-
toolchain go1.25.4
3+
go 1.25.5
64

75
require (
86
github.com/gruntwork-io/terratest v0.54.0
97
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34
8+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.2
119
)
1210

1311
require (
1412
dario.cat/mergo v1.0.0 // indirect
1513
github.com/IBM-Cloud/bluemix-go v0.0.0-20240719075425-078fcb3a55be // indirect
16-
github.com/IBM-Cloud/power-go-client v1.14.3 // indirect
14+
github.com/IBM-Cloud/power-go-client v1.14.4 // indirect
1715
github.com/IBM/cloud-databases-go-sdk v0.8.1 // indirect
1816
github.com/IBM/go-sdk-core/v5 v5.21.2 // indirect
19-
github.com/IBM/platform-services-go-sdk v0.90.4 // indirect
17+
github.com/IBM/platform-services-go-sdk v0.91.0 // indirect
2018
github.com/IBM/project-go-sdk v0.4.0 // indirect
2119
github.com/IBM/schematics-go-sdk v0.4.0 // indirect
2220
github.com/IBM/vpc-go-sdk v1.0.2 // indirect
@@ -37,7 +35,7 @@ require (
3735
github.com/go-logr/logr v1.4.2 // indirect
3836
github.com/go-logr/stdr v1.2.2 // indirect
3937
github.com/go-openapi/analysis v0.23.0 // indirect
40-
github.com/go-openapi/errors v0.22.4 // indirect
38+
github.com/go-openapi/errors v0.22.5 // indirect
4139
github.com/go-openapi/jsonpointer v0.21.1 // indirect
4240
github.com/go-openapi/jsonreference v0.21.0 // indirect
4341
github.com/go-openapi/loads v0.22.0 // indirect
@@ -90,13 +88,13 @@ require (
9088
go.opentelemetry.io/otel/metric v1.35.0 // indirect
9189
go.opentelemetry.io/otel/trace v1.35.0 // indirect
9290
go.yaml.in/yaml/v2 v2.4.3 // indirect
93-
golang.org/x/crypto v0.45.0 // indirect
94-
golang.org/x/mod v0.29.0 // indirect
91+
golang.org/x/crypto v0.46.0 // indirect
92+
golang.org/x/mod v0.30.0 // indirect
9593
golang.org/x/net v0.47.0 // indirect
96-
golang.org/x/sync v0.18.0 // indirect
97-
golang.org/x/sys v0.38.0 // indirect
98-
golang.org/x/text v0.31.0 // indirect
99-
golang.org/x/tools v0.38.0 // indirect
94+
golang.org/x/sync v0.19.0 // indirect
95+
golang.org/x/sys v0.39.0 // indirect
96+
golang.org/x/text v0.32.0 // indirect
97+
golang.org/x/tools v0.39.0 // indirect
10098
gopkg.in/warnings.v0 v0.1.2 // indirect
10199
gopkg.in/yaml.v2 v2.4.0 // indirect
102100
gopkg.in/yaml.v3 v3.0.1 // indirect

0 commit comments

Comments
 (0)