diff --git a/README.md b/README.md
index f254a11..03067ab 100644
--- a/README.md
+++ b/README.md
@@ -73,7 +73,7 @@ You need the following permissions to run this module.
| Name | Source | Version |
|------|--------|---------|
-| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29.0 |
+| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30.0 |
| [crn\_parser](#module\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [en\_crn\_parser](#module\_en\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index 80eea7d..4cadfce 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
count = var.existing_scc_instance_crn == null ? 1 : 0
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.11"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.19.12"
+ version = "1.19.18"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -45,7 +45,7 @@ module "event_notification" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.6"
+ version = "1.5.8"
name = "${var.prefix}-wp"
region = var.region
resource_group_id = module.resource_group.resource_group_id
@@ -150,7 +150,7 @@ resource "ibm_is_vpc" "example_vpc" {
##############################################################################
module "cbr_zone" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.29.0"
+ version = "1.30.0"
name = "${var.prefix}-VPC-network-zone"
zone_description = "CBR Network zone representing VPC"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
diff --git a/examples/basic/main.tf b/examples/basic/main.tf
index 18f9a73..f5fa20e 100644
--- a/examples/basic/main.tf
+++ b/examples/basic/main.tf
@@ -7,7 +7,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.11"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
diff --git a/main.tf b/main.tf
index 7e69caf..134ce40 100644
--- a/main.tf
+++ b/main.tf
@@ -231,7 +231,7 @@ resource "ibm_scc_provider_type_instance" "custom_integrations" {
module "cbr_rule" {
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.29.0"
+ version = "1.30.0"
rule_description = var.cbr_rules[count.index].description
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
rule_contexts = var.cbr_rules[count.index].rule_contexts
diff --git a/solutions/fully-configurable/README.md b/solutions/fully-configurable/README.md
index 5c14bb5..b4dd619 100644
--- a/solutions/fully-configurable/README.md
+++ b/solutions/fully-configurable/README.md
@@ -29,13 +29,13 @@ This solution supports provisioning and configuring the following infrastructure
| Name | Source | Version |
|------|--------|---------|
-| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.8 |
+| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.11 |
| [existing\_cos\_crn\_parser](#module\_existing\_cos\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_en\_crn\_parser](#module\_existing\_en\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_kms\_key\_crn\_parser](#module\_existing\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_scc\_crn\_parser](#module\_existing\_scc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
-| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.6 |
+| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.10 |
| [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
| [scc](#module\_scc) | ../.. | n/a |
| [scc\_attachment](#module\_scc\_attachment) | ../../modules/attachment | n/a |
diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf
index daa4505..d9a65e9 100644
--- a/solutions/fully-configurable/main.tf
+++ b/solutions/fully-configurable/main.tf
@@ -100,7 +100,7 @@ module "kms" {
}
count = var.existing_scc_instance_crn == null && var.kms_encryption_enabled_bucket && var.existing_kms_key_crn == null ? 1 : 0
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.21.6"
+ version = "4.21.10"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -171,7 +171,7 @@ module "buckets" {
count = var.existing_scc_instance_crn == null ? 1 : 0
depends_on = [time_sleep.wait_for_authorization_policy[0]]
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
- version = "8.21.8"
+ version = "8.21.11"
bucket_configs = local.bucket_config
}
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index cc52e3a..c851539 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -7,7 +7,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.11"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
diff --git a/tests/resources/existing-resources-test/main.tf b/tests/resources/existing-resources-test/main.tf
index a704595..fe45f97 100644
--- a/tests/resources/existing-resources-test/main.tf
+++ b/tests/resources/existing-resources-test/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.11"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
module "scc" {
source = "terraform-ibm-modules/scc/ibm"
- version = "2.1.10"
+ version = "2.1.12"
instance_name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
@@ -45,7 +45,7 @@ module "scc" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.6"
+ version = "1.5.8"
name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
diff --git a/tests/resources/prereq-resources/main.tf b/tests/resources/prereq-resources/main.tf
index f68c775..a85be62 100644
--- a/tests/resources/prereq-resources/main.tf
+++ b/tests/resources/prereq-resources/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.21.8"
+ version = "8.21.11"
resource_group_id = module.resource_group.resource_group_id
cos_instance_name = "${var.prefix}-cos"
cos_tags = var.resource_tags
@@ -29,7 +29,7 @@ module "cos" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.6"
+ version = "1.5.8"
name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
@@ -56,7 +56,7 @@ module "cloud_monitoring" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.19.12"
+ version = "1.19.18"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags