diff --git a/examples/complete/README.md b/examples/complete/README.md
index d707ff95..465c534e 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -14,8 +14,8 @@ This examples handles the provisioning of a new Secrets Manager instance.
| Name | Source | Version |
|------|--------|---------|
-| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.10.17 |
-| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.16.4 |
+| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.14.1 |
+| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.16.8 |
| [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
| [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index 260706f9..cef99228 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -8,7 +8,7 @@ module "resource_group" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.16.4"
+ version = "4.16.8"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.10.17"
+ version = "1.14.1"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index c8ff5701..69823497 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -42,7 +42,7 @@ module "cbr_zone" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.10.17"
+ version = "1.14.1"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/modules/secrets/README.md b/modules/secrets/README.md
index 84b2a9d2..03a73aff 100644
--- a/modules/secrets/README.md
+++ b/modules/secrets/README.md
@@ -51,7 +51,7 @@ module "secrets_manager" {
| Name | Source | Version |
|------|--------|---------|
| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.2.2 |
-| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.3.2 |
+| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.3.3 |
### Resources
diff --git a/modules/secrets/main.tf b/modules/secrets/main.tf
index 0532b691..0a51a116 100644
--- a/modules/secrets/main.tf
+++ b/modules/secrets/main.tf
@@ -52,7 +52,7 @@ locals {
module "secrets" {
for_each = { for obj in local.secrets : obj.secret_name => obj }
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
- version = "1.3.2"
+ version = "1.3.3"
region = var.existing_sm_instance_region
secrets_manager_guid = var.existing_sm_instance_guid
secret_group_id = each.value.secret_group_id
diff --git a/solutions/standard/main.tf b/solutions/standard/main.tf
index a273b2ab..f4f17720 100644
--- a/solutions/standard/main.tf
+++ b/solutions/standard/main.tf
@@ -64,7 +64,7 @@ module "kms" {
}
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.16.4"
+ version = "4.16.8"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -125,7 +125,7 @@ module "secrets_manager" {
module "iam_secrets_engine" {
count = var.iam_engine_enabled ? 1 : 0
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
- version = "1.2.3"
+ version = "1.2.5"
region = local.secrets_manager_region
iam_engine_name = var.prefix != null ? "${var.prefix}-${var.iam_engine_name}" : var.iam_engine_name
secrets_manager_guid = local.secrets_manager_guid
@@ -143,7 +143,7 @@ locals {
module "secrets_manager_public_cert_engine" {
count = var.public_engine_enabled ? 1 : 0
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
- version = "1.0.1"
+ version = "1.0.2"
providers = {
ibm = ibm
ibm.secret-store = ibm
@@ -163,7 +163,7 @@ module "secrets_manager_public_cert_engine" {
module "private_secret_engine" {
count = var.private_engine_enabled ? 1 : 0
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
- version = "1.3.3"
+ version = "1.3.4"
secrets_manager_guid = local.secrets_manager_guid
region = var.region
root_ca_name = var.root_ca_name
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index 045e0a84..5411e0c4 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.10.17"
+ version = "1.14.1"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.16.4"
+ version = "4.16.8"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region