File tree Expand file tree Collapse file tree 3 files changed +7
-7
lines changed Expand file tree Collapse file tree 3 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -252,7 +252,7 @@ module "cloud_monitoring_crn_parser" {
252252module "cloud_monitoring" {
253253 count = var. cloud_monitoring_provision ? 1 : 0
254254 source = " terraform-ibm-modules/cloud-monitoring/ibm"
255- version = " 1.2.2 "
255+ version = " 1.2.3 "
256256 region = var. region
257257 resource_group_id = module. resource_group . resource_group_id
258258 instance_name = local. cloud_monitoring_instance_name
@@ -312,7 +312,7 @@ module "cloud_logs" {
312312
313313module "metrics_router" {
314314 source = " terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing"
315- version = " 1.2.2 "
315+ version = " 1.2.3 "
316316 metrics_router_targets = var. enable_metrics_routing_to_cloud_monitoring ? [
317317 {
318318 destination_crn = var.cloud_monitoring_provision ? module.cloud_monitoring[0 ].crn : var.existing_cloud_monitoring_crn
@@ -384,7 +384,7 @@ module "kms" {
384384 }
385385 count = (var. existing_cos_kms_key_crn != null || (length (coalesce (local. buckets_config , [])) == 0 )) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
386386 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
387- version = " 5.1.3 "
387+ version = " 5.1.4 "
388388 create_key_protect_instance = false
389389 region = local. kms_region
390390 existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -62,7 +62,7 @@ module "cloud_log_buckets" {
6262
6363module "cloud_monitoring" {
6464 source = " terraform-ibm-modules/cloud-monitoring/ibm"
65- version = " 1.2.2 "
65+ version = " 1.2.3 "
6666 region = var. region
6767 resource_group_id = module. resource_group . resource_group_id
6868 instance_name = var. prefix
Original file line number Diff line number Diff line change @@ -86,7 +86,7 @@ module "buckets" {
8686
8787module "cloud_monitoring" {
8888 source = " terraform-ibm-modules/cloud-monitoring/ibm"
89- version = " 1.2.2 "
89+ version = " 1.2.3 "
9090 region = var. region
9191 resource_group_id = module. resource_group . resource_group_id
9292 instance_name = var. prefix
@@ -127,7 +127,7 @@ locals {
127127
128128module "trusted_profile" {
129129 source = " terraform-ibm-modules/trusted-profile/ibm"
130- version = " 2.3.0 "
130+ version = " 2.3.1 "
131131 trusted_profile_name = " ${ var . prefix } -profile"
132132 trusted_profile_description = " Logs agent Trusted Profile"
133133 # As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
@@ -178,7 +178,7 @@ locals {
178178
179179module "ocp_base" {
180180 source = " terraform-ibm-modules/base-ocp-vpc/ibm"
181- version = " 3.46.17 "
181+ version = " 3.46.18 "
182182 resource_group_id = module. resource_group . resource_group_id
183183 region = var. region
184184 tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments