This repository was archived by the owner on May 28, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 9 files changed +16
-16
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 9 files changed +16
-16
lines changed Original file line number Diff line number Diff line change @@ -73,7 +73,7 @@ You need the following permissions to run this module.
7373
7474| Name | Source | Version |
7575| ------| --------| ---------|
76- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
76+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
7777| <a name =" module_crn_parser " ></a > [ crn\_ parser] ( #module\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
7878| <a name =" module_en_crn_parser " ></a > [ en\_ crn\_ parser] ( #module\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
7979
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616module "cos" {
1717 count = var. existing_scc_instance_crn == null ? 1 : 0
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.11 "
19+ version = " 8.21.15 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "event_notification" {
3232 source = " terraform-ibm-modules/event-notifications/ibm"
33- version = " 1.19.18 "
33+ version = " 1.19.19 "
3434 resource_group_id = module. resource_group . resource_group_id
3535 name = " ${ var . prefix } -en"
3636 tags = var. resource_tags
@@ -150,7 +150,7 @@ resource "ibm_is_vpc" "example_vpc" {
150150# #############################################################################
151151module "cbr_zone" {
152152 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
153- version = " 1.30 .0"
153+ version = " 1.31 .0"
154154 name = " ${ var . prefix } -VPC-network-zone"
155155 zone_description = " CBR Network zone representing VPC"
156156 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ module "resource_group" {
77
88module "cos" {
99 source = " terraform-ibm-modules/cos/ibm"
10- version = " 8.21.11 "
10+ version = " 8.21.15 "
1111 cos_instance_name = " ${ var . prefix } -cos"
1212 kms_encryption_enabled = false
1313 retention_enabled = false
Original file line number Diff line number Diff line change @@ -231,7 +231,7 @@ resource "ibm_scc_provider_type_instance" "custom_integrations" {
231231module "cbr_rule" {
232232 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
233233 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
234- version = " 1.30 .0"
234+ version = " 1.31 .0"
235235 rule_description = var. cbr_rules [count . index ]. description
236236 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
237237 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -29,13 +29,13 @@ This solution supports provisioning and configuring the following infrastructure
2929
3030| Name | Source | Version |
3131| ------| --------| ---------|
32- | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.11 |
32+ | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.15 |
3333| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3535| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3636| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3737| <a name =" module_existing_scc_crn_parser " ></a > [ existing\_ scc\_ crn\_ parser] ( #module\_ existing\_ scc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
38- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.0 |
38+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 |
3939| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
4040| <a name =" module_scc " ></a > [ scc] ( #module\_ scc ) | ../.. | n/a |
4141| <a name =" module_scc_attachment " ></a > [ scc\_ attachment] ( #module\_ scc\_ attachment ) | ../../modules/attachment | n/a |
Original file line number Diff line number Diff line change @@ -100,7 +100,7 @@ module "kms" {
100100 }
101101 count = var. existing_scc_instance_crn == null && var. kms_encryption_enabled_bucket && var. existing_kms_key_crn == null ? 1 : 0
102102 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
103- version = " 5.0.0 "
103+ version = " 5.0.1 "
104104 create_key_protect_instance = false
105105 region = local. kms_region
106106 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -171,7 +171,7 @@ module "buckets" {
171171 count = var. existing_scc_instance_crn == null ? 1 : 0
172172 depends_on = [time_sleep . wait_for_authorization_policy [0 ]]
173173 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
174- version = " 8.21.11 "
174+ version = " 8.21.15 "
175175 bucket_configs = local. bucket_config
176176}
177177
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ module "resource_group" {
77
88module "cos" {
99 source = " terraform-ibm-modules/cos/ibm"
10- version = " 8.21.11 "
10+ version = " 8.21.15 "
1111 cos_instance_name = " ${ var . prefix } -cos"
1212 kms_encryption_enabled = false
1313 retention_enabled = false
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.11 "
19+ version = " 8.21.15 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "scc" {
3232 source = " terraform-ibm-modules/scc/ibm"
33- version = " 2.1.12 "
33+ version = " 2.1.14 "
3434 instance_name = var. prefix
3535 region = var. region
3636 resource_group_id = module. resource_group . resource_group_id
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.11 "
19+ version = " 8.21.15 "
2020 resource_group_id = module. resource_group . resource_group_id
2121 cos_instance_name = " ${ var . prefix } -cos"
2222 cos_tags = var. resource_tags
@@ -42,7 +42,7 @@ module "scc_wp" {
4242
4343module "cloud_monitoring" {
4444 source = " terraform-ibm-modules/observability-instances/ibm//modules/cloud_monitoring"
45- version = " 3.5.0 "
45+ version = " 3.5.1 "
4646 resource_group_id = module. resource_group . resource_group_id
4747 region = var. region
4848 instance_name = " ${ var . prefix } -mon"
@@ -56,7 +56,7 @@ module "cloud_monitoring" {
5656
5757module "event_notifications" {
5858 source = " terraform-ibm-modules/event-notifications/ibm"
59- version = " 1.19.18 "
59+ version = " 1.19.19 "
6060 resource_group_id = module. resource_group . resource_group_id
6161 name = " ${ var . prefix } -en"
6262 tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments