Skip to content

Commit 23746d1

Browse files
fix(deps): update terraform-module (#161)
1 parent c4543db commit 23746d1

File tree

4 files changed

+17
-17
lines changed

4 files changed

+17
-17
lines changed

solutions/agents/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ data "ibm_container_cluster_config" "cluster_config" {
1111

1212
module "observability_agents" {
1313
source = "terraform-ibm-modules/observability-agents/ibm"
14-
version = "2.3.3"
14+
version = "2.3.6"
1515
cluster_id = var.cluster_id
1616
cluster_resource_group_id = var.cluster_resource_group_id
1717
cluster_config_endpoint_type = var.cluster_config_endpoint_type

solutions/instances/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -228,21 +228,21 @@ resource "ibm_iam_authorization_policy" "cos_policy" {
228228
module "en_crn_parser" {
229229
count = length(local.cloud_logs_existing_en_instances)
230230
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
231-
version = "1.0.0"
231+
version = "1.1.0"
232232
crn = local.cloud_logs_existing_en_instances[count.index]["instance_crn"]
233233
}
234234

235235
module "cloud_monitoring_crn_parser" {
236236
count = var.existing_cloud_monitoring_crn != null ? 1 : 0
237237
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
238-
version = "1.0.0"
238+
version = "1.1.0"
239239
crn = var.existing_cloud_monitoring_crn
240240
}
241241

242242
module "observability_instance" {
243243
depends_on = [time_sleep.wait_for_atracker_cos_authorization_policy]
244244
source = "terraform-ibm-modules/observability-instances/ibm"
245-
version = "3.3.1"
245+
version = "3.4.0"
246246
region = var.region
247247
resource_group_id = module.resource_group.resource_group_id
248248

@@ -359,7 +359,7 @@ module "kms" {
359359
}
360360
count = (var.existing_cos_kms_key_crn != null || (length(coalesce(local.buckets_config, [])) == 0)) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
361361
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
362-
version = "4.15.13"
362+
version = "4.19.1"
363363
create_key_protect_instance = false
364364
region = local.kms_region
365365
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -449,7 +449,7 @@ module "cos_instance" {
449449
}
450450
count = var.existing_cos_instance_crn == null && length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS instance
451451
source = "terraform-ibm-modules/cos/ibm//modules/fscloud"
452-
version = "8.14.1"
452+
version = "8.16.4"
453453
resource_group_id = local.cos_resource_group_id
454454
create_cos_instance = true
455455
cos_instance_name = var.prefix != null ? "${var.prefix}-${var.cos_instance_name}" : var.cos_instance_name
@@ -466,7 +466,7 @@ module "cos_bucket" {
466466
}
467467
count = length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS bucket
468468
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
469-
version = "8.14.1"
469+
version = "8.16.4"
470470
bucket_configs = [
471471
for value in local.buckets_config :
472472
{

tests/resources/existing-resources/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "8.11.11"
19+
version = "8.16.4"
2020
resource_group_id = module.resource_group.resource_group_id
2121
region = var.region
2222
cos_instance_name = "${var.prefix}-cos"
@@ -28,7 +28,7 @@ module "cos" {
2828

2929
module "additional_cos_bucket" {
3030
source = "terraform-ibm-modules/cos/ibm"
31-
version = "8.11.11"
31+
version = "8.16.4"
3232
region = var.region
3333
create_cos_instance = false
3434
existing_cos_instance_id = module.cos.cos_instance_id
@@ -38,7 +38,7 @@ module "additional_cos_bucket" {
3838

3939
module "cloud_log_buckets" {
4040
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
41-
version = "8.6.2"
41+
version = "8.16.4"
4242
bucket_configs = [
4343
{
4444
bucket_name = "${var.prefix}-data-bucket"
@@ -65,7 +65,7 @@ module "cloud_log_buckets" {
6565

6666
module "event_notification_1" {
6767
source = "terraform-ibm-modules/event-notifications/ibm"
68-
version = "1.6.5"
68+
version = "1.15.11"
6969
resource_group_id = module.resource_group.resource_group_id
7070
name = "${var.prefix}-en-1"
7171
tags = var.resource_tags
@@ -76,7 +76,7 @@ module "event_notification_1" {
7676

7777
module "event_notification_2" {
7878
source = "terraform-ibm-modules/event-notifications/ibm"
79-
version = "1.6.5"
79+
version = "1.15.11"
8080
resource_group_id = module.resource_group.resource_group_id
8181
name = "${var.prefix}-en-2"
8282
tags = var.resource_tags

tests/resources/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ module "resource_group" {
1515
##############################################################################
1616

1717
module "landing_zone" {
18-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.0.1"
18+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.6.3"
1919
region = var.region
2020
prefix = var.prefix
2121
tags = var.resource_tags
@@ -33,7 +33,7 @@ module "landing_zone" {
3333

3434
module "cos" {
3535
source = "terraform-ibm-modules/cos/ibm"
36-
version = "8.11.14"
36+
version = "8.16.4"
3737
resource_group_id = module.resource_group.resource_group_id
3838
cos_instance_name = "${var.prefix}-cos"
3939
cos_tags = var.resource_tags
@@ -51,7 +51,7 @@ locals {
5151

5252
module "buckets" {
5353
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
54-
version = "8.11.14"
54+
version = "8.16.4"
5555
bucket_configs = [
5656
{
5757
bucket_name = local.logs_bucket_name
@@ -81,7 +81,7 @@ locals {
8181

8282
module "observability_instances" {
8383
source = "terraform-ibm-modules/observability-instances/ibm"
84-
version = "3.0.2"
84+
version = "3.4.0"
8585
resource_group_id = local.cluster_resource_group_id
8686
region = var.region
8787
cloud_monitoring_plan = "graduated-tier"
@@ -117,7 +117,7 @@ locals {
117117

118118
module "trusted_profile" {
119119
source = "terraform-ibm-modules/trusted-profile/ibm"
120-
version = "1.0.4"
120+
version = "1.0.5"
121121
trusted_profile_name = "${var.prefix}-profile"
122122
trusted_profile_description = "Logs agent Trusted Profile"
123123
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.

0 commit comments

Comments
 (0)