diff --git a/modules/powervs-vpc-landing-zone/README.md b/modules/powervs-vpc-landing-zone/README.md index 3499672f..f6477611 100644 --- a/modules/powervs-vpc-landing-zone/README.md +++ b/modules/powervs-vpc-landing-zone/README.md @@ -104,15 +104,15 @@ Creates VPC Landing Zone | Performs VPC VSI OS Config | Creates PowerVS Infrastr | Name | Source | Version | |------|--------|---------| -| [client\_to\_site\_vpn](#module\_client\_to\_site\_vpn) | terraform-ibm-modules/client-to-site-vpn/ibm | 3.0.6 | +| [client\_to\_site\_vpn](#module\_client\_to\_site\_vpn) | terraform-ibm-modules/client-to-site-vpn/ibm | 3.0.9 | | [configure\_monitoring\_host](#module\_configure\_monitoring\_host) | ./submodules/ansible | n/a | | [configure\_network\_services](#module\_configure\_network\_services) | ./submodules/ansible | n/a | | [configure\_scc\_wp\_agent](#module\_configure\_scc\_wp\_agent) | ./submodules/ansible | n/a | -| [landing\_zone](#module\_landing\_zone) | terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module | 7.4.7 | +| [landing\_zone](#module\_landing\_zone) | terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module | 7.5.0 | | [powervs\_workspace](#module\_powervs\_workspace) | terraform-ibm-modules/powervs-workspace/ibm | 3.0.2 | -| [private\_secret\_engine](#module\_private\_secret\_engine) | terraform-ibm-modules/secrets-manager-private-cert-engine/ibm | 1.4.0 | -| [scc\_wp\_instance](#module\_scc\_wp\_instance) | terraform-ibm-modules/scc-workload-protection/ibm | 1.5.11 | -| [secrets\_manager\_group](#module\_secrets\_manager\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.5 | +| [private\_secret\_engine](#module\_private\_secret\_engine) | terraform-ibm-modules/secrets-manager-private-cert-engine/ibm | 1.5.1 | +| [scc\_wp\_instance](#module\_scc\_wp\_instance) | terraform-ibm-modules/scc-workload-protection/ibm | 1.5.12 | +| [secrets\_manager\_group](#module\_secrets\_manager\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.6 | | [secrets\_manager\_private\_certificate](#module\_secrets\_manager\_private\_certificate) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.3.3 | | [vpc\_file\_share\_alb](#module\_vpc\_file\_share\_alb) | ./submodules/fileshare-alb | n/a | diff --git a/modules/powervs-vpc-landing-zone/client2sitevpn.tf b/modules/powervs-vpc-landing-zone/client2sitevpn.tf index e9e358f6..8986b3c7 100644 --- a/modules/powervs-vpc-landing-zone/client2sitevpn.tf +++ b/modules/powervs-vpc-landing-zone/client2sitevpn.tf @@ -76,7 +76,7 @@ resource "ibm_resource_instance" "secrets_manager" { # Configure private cert engine if provisioning a new SM instance module "private_secret_engine" { source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm" - version = "1.4.0" + version = "1.5.1" providers = { ibm = ibm.ibm-sm } count = var.client_to_site_vpn.enable && var.existing_sm_instance_guid == null ? 1 : 0 depends_on = [ibm_resource_instance.secrets_manager] @@ -93,7 +93,7 @@ module "private_secret_engine" { # Create a secret group to place the certificate in module "secrets_manager_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.5" + version = "1.3.6" providers = { ibm = ibm.ibm-sm } count = var.client_to_site_vpn.enable ? 1 : 0 @@ -126,7 +126,7 @@ module "secrets_manager_private_certificate" { # Create client to site VPN Server module "client_to_site_vpn" { source = "terraform-ibm-modules/client-to-site-vpn/ibm" - version = "3.0.6" + version = "3.0.9" providers = { ibm = ibm.ibm-is } count = var.client_to_site_vpn.enable ? 1 : 0 diff --git a/modules/powervs-vpc-landing-zone/main.tf b/modules/powervs-vpc-landing-zone/main.tf index 3710e561..1754560c 100644 --- a/modules/powervs-vpc-landing-zone/main.tf +++ b/modules/powervs-vpc-landing-zone/main.tf @@ -18,7 +18,7 @@ locals { module "landing_zone" { source = "terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module" - version = "7.4.7" + version = "7.5.0" providers = { ibm = ibm.ibm-is } ssh_public_key = var.ssh_public_key @@ -58,7 +58,7 @@ locals { module "scc_wp_instance" { source = "terraform-ibm-modules/scc-workload-protection/ibm" - version = "1.5.11" + version = "1.5.12" providers = { ibm = ibm.ibm-is } count = var.enable_scc_wp ? 1 : 0 diff --git a/solutions/standard-plus-vsi/README.md b/solutions/standard-plus-vsi/README.md index cb0bfb77..d809bb72 100644 --- a/solutions/standard-plus-vsi/README.md +++ b/solutions/standard-plus-vsi/README.md @@ -53,7 +53,7 @@ This example sets up the following infrastructure: | Name | Source | Version | |------|--------|---------| -| [powervs\_instance](#module\_powervs\_instance) | terraform-ibm-modules/powervs-instance/ibm | 2.6.1 | +| [powervs\_instance](#module\_powervs\_instance) | terraform-ibm-modules/powervs-instance/ibm | 2.6.2 | | [standard](#module\_standard) | ../../modules/powervs-vpc-landing-zone | n/a | ### Resources diff --git a/solutions/standard-plus-vsi/main.tf b/solutions/standard-plus-vsi/main.tf index c7729a44..46382b0f 100644 --- a/solutions/standard-plus-vsi/main.tf +++ b/solutions/standard-plus-vsi/main.tf @@ -41,7 +41,7 @@ module "standard" { module "powervs_instance" { source = "terraform-ibm-modules/powervs-instance/ibm" - version = "2.6.1" + version = "2.6.2" providers = { ibm = ibm.ibm-pi } pi_workspace_guid = module.standard.powervs_workspace_guid