@@ -245,7 +245,7 @@ module "cloud_monitoring_crn_parser" {
245245module  "cloud_monitoring"  {
246246  count                    =  . cloud_monitoring_provision  ?  1  :  0 
247247  source                   =  " terraform-ibm-modules/cloud-monitoring/ibm" 
248-   version                  =  " 1.6.5 " 
248+   version                  =  " 1.6.6 " 
249249  region                   =  . region 
250250  resource_group_id        =  . resource_group . resource_group_id 
251251  instance_name            =  . cloud_monitoring_instance_name 
@@ -259,7 +259,7 @@ module "cloud_monitoring" {
259259module  "cloud_logs"  {
260260  count              =  . cloud_logs_provision  ?  1  :  0 
261261  source             =  " terraform-ibm-modules/cloud-logs/ibm" 
262-   version            =  " 1.6.18 " 
262+   version            =  " 1.6.20 " 
263263  region             =  . region 
264264  resource_group_id  =  . resource_group . resource_group_id 
265265  instance_name      =  . cloud_logs_instance_name 
@@ -304,7 +304,7 @@ module "cloud_logs" {
304304
305305module  "metrics_router"  {
306306  source   =  " terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing" 
307-   version  =  " 1.6.5 " 
307+   version  =  " 1.6.6 " 
308308  metrics_router_targets  =  . enable_metrics_routing_to_cloud_monitoring  ?  [
309309    {
310310      destination_crn                 =  var.cloud_monitoring_provision ?  module.cloud_monitoring[0 ].crn :  var.existing_cloud_monitoring_crn
@@ -320,7 +320,7 @@ module "metrics_router" {
320320module  "activity_tracker"  {
321321  depends_on  =  time_sleep . wait_for_atracker_cos_authorization_policy ]
322322  source      =  " terraform-ibm-modules/activity-tracker/ibm" 
323-   version     =  " 1.2.18 " 
323+   version     =  " 1.2.24 " 
324324  cos_targets  =  . enable_at_event_routing_to_cos_bucket  ?  [
325325    {
326326      bucket_name                       =  local.cos_target_bucket_name
@@ -376,7 +376,7 @@ module "kms" {
376376  }
377377  count                        =  . existing_cos_kms_key_crn  !=  null  ||  (length (coalesce (local. buckets_config , [])) ==  0 )) ?  0  :  1  #  no need to create any KMS resources if passing an existing key, or bucket
378378  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
379-   version                      =  " 5.1.20 " 
379+   version                      =  " 5.1.22 " 
380380  create_key_protect_instance  =  false 
381381  region                       =  . kms_region 
382382  existing_kms_instance_crn    =  . existing_kms_instance_crn 
@@ -466,7 +466,7 @@ module "cos_instance" {
466466  }
467467  count                     =  . existing_cos_instance_crn  ==  null  &&  length (coalesce (local. buckets_config , [])) !=  0  ?  1  :  0  #  no need to call COS module if consumer is using existing COS instance
468468  source                    =  " terraform-ibm-modules/cos/ibm//modules/fscloud" 
469-   version                   =  " 10.2.7 " 
469+   version                   =  " 10.2.12 " 
470470  resource_group_id         =  . cos_resource_group_id 
471471  create_cos_instance       =  true 
472472  cos_instance_name         =  try (" ${ local . prefix } -${ var . cos_instance_name } " . cos_instance_name )
@@ -483,7 +483,7 @@ module "cos_bucket" {
483483  }
484484  count    =  length (coalesce (local. buckets_config , [])) !=  0  ?  1  :  0  #  no need to call COS module if consumer is using existing COS bucket
485485  source   =  " terraform-ibm-modules/cos/ibm//modules/buckets" 
486-   version  =  " 10.2.7 " 
486+   version  =  " 10.2.12 " 
487487  bucket_configs  =  
488488    for  value  in  local . buckets_config  : 
489489    {
0 commit comments