@@ -252,7 +252,7 @@ module "cloud_monitoring_crn_parser" {
252252module "cloud_monitoring" {
253253 count = var. cloud_monitoring_provision ? 1 : 0
254254 source = " terraform-ibm-modules/cloud-monitoring/ibm"
255- version = " 1.2.8 "
255+ version = " 1.2.12 "
256256 region = var. region
257257 resource_group_id = module. resource_group . resource_group_id
258258 instance_name = local. cloud_monitoring_instance_name
@@ -266,7 +266,7 @@ module "cloud_monitoring" {
266266module "cloud_logs" {
267267 count = var. cloud_logs_provision ? 1 : 0
268268 source = " terraform-ibm-modules/cloud-logs/ibm"
269- version = " 1.3.5 "
269+ version = " 1.3.7 "
270270 region = var. region
271271 resource_group_id = module. resource_group . resource_group_id
272272 instance_name = local. cloud_logs_instance_name
@@ -312,7 +312,7 @@ module "cloud_logs" {
312312
313313module "metrics_router" {
314314 source = " terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing"
315- version = " 1.2.8 "
315+ version = " 1.2.12 "
316316 metrics_router_targets = var. enable_metrics_routing_to_cloud_monitoring ? [
317317 {
318318 destination_crn = var.cloud_monitoring_provision ? module.cloud_monitoring[0 ].crn : var.existing_cloud_monitoring_crn
@@ -384,7 +384,7 @@ module "kms" {
384384 }
385385 count = (var. existing_cos_kms_key_crn != null || (length (coalesce (local. buckets_config , [])) == 0 )) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
386386 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
387- version = " 5.1.6 "
387+ version = " 5.1.7 "
388388 create_key_protect_instance = false
389389 region = local. kms_region
390390 existing_kms_instance_crn = var. existing_kms_instance_crn
0 commit comments