diff --git a/examples/complete/README.md b/examples/complete/README.md
index a2cfccc7..4429de2c 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -15,8 +15,8 @@ This examples handles the provisioning of a new Secrets Manager instance.
| Name | Source | Version |
|------|--------|---------|
-| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.18.8 |
-| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.20.0 |
+| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.19.4 |
+| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.3 |
| [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
| [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index 0238d975..0cafbea5 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -8,7 +8,7 @@ module "resource_group" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.20.0"
+ version = "4.21.3"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.18.8"
+ version = "1.19.4"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index ffdea185..f0f89823 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -42,7 +42,7 @@ module "cbr_zone" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.18.8"
+ version = "1.19.4"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/modules/secrets/README.md b/modules/secrets/README.md
index 5b478975..54c335a4 100644
--- a/modules/secrets/README.md
+++ b/modules/secrets/README.md
@@ -50,7 +50,7 @@ module "secrets_manager" {
| Name | Source | Version |
|------|--------|---------|
-| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.2.2 |
+| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.2.3 |
| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.7.0 |
### Resources
diff --git a/modules/secrets/main.tf b/modules/secrets/main.tf
index f3f5bf18..7d49e1e9 100644
--- a/modules/secrets/main.tf
+++ b/modules/secrets/main.tf
@@ -21,7 +21,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
module "secret_groups" {
for_each = { for obj in local.secret_groups : obj.secret_group_name => obj }
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
- version = "1.2.2"
+ version = "1.2.3"
region = var.existing_sm_instance_region
secrets_manager_guid = var.existing_sm_instance_guid
secret_group_name = each.value.secret_group_name
diff --git a/solutions/standard/main.tf b/solutions/standard/main.tf
index be3a304e..640dbbe8 100644
--- a/solutions/standard/main.tf
+++ b/solutions/standard/main.tf
@@ -65,7 +65,7 @@ module "kms" {
}
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.20.0"
+ version = "4.21.3"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -123,7 +123,7 @@ module "secrets_manager" {
module "iam_secrets_engine" {
count = var.iam_engine_enabled ? 1 : 0
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
- version = "1.2.8"
+ version = "1.2.10"
region = local.secrets_manager_region
iam_engine_name = try("${local.prefix}-${var.iam_engine_name}", var.iam_engine_name)
secrets_manager_guid = local.secrets_manager_guid
@@ -135,7 +135,7 @@ module "iam_secrets_engine" {
module "secrets_manager_public_cert_engine" {
count = var.public_cert_engine_enabled ? 1 : 0
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
- version = "1.0.2"
+ version = "1.0.3"
providers = {
ibm = ibm
ibm.secret-store = ibm
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index de19c2e7..c6fbaacf 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "1.18.8"
+ version = "1.19.4"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.20.0"
+ version = "4.21.3"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region