diff --git a/README.md b/README.md index a3e9cfc3..b1e1ec09 100644 --- a/README.md +++ b/README.md @@ -207,7 +207,7 @@ Optionally, you need the following permissions to attach Access Management tags | [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | | [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 | -| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.9.1 | +| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.10.0 | ### Resources diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 99de8109..c7e292b0 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -22,7 +22,7 @@ locals { module "kp_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.15.2" + version = "4.15.4" key_protect_instance_name = "${var.prefix}-kp-instance" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 13f49003..3097bfd6 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos_fscloud" { source = "terraform-ibm-modules/cos/ibm" - version = "8.9.1" + version = "8.10.0" resource_group_id = module.resource_group.resource_group_id create_cos_bucket = false cos_instance_name = "${var.prefix}-cos" @@ -32,7 +32,7 @@ module "cos_fscloud" { module "flowlogs_bucket" { source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.9.1" + version = "8.10.0" bucket_configs = [ { @@ -113,7 +113,7 @@ locals { # Create Sysdig and Activity Tracker instance module "observability_instances" { source = "terraform-ibm-modules/observability-instances/ibm" - version = "2.13.2" + version = "2.14.0" providers = { logdna.at = logdna.at logdna.ld = logdna.ld @@ -144,7 +144,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.23.1" + version = "1.23.5" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone containing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -156,7 +156,7 @@ module "cbr_zone" { module "cbr_rules" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.23.1" + version = "1.23.5" rule_description = "${var.prefix} rule for vpc flow log access to cos" enforcement_mode = "enabled" resources = [{ diff --git a/examples/multiple_mzr_clusters/main.tf b/examples/multiple_mzr_clusters/main.tf index 30db4650..e2d4c7f4 100644 --- a/examples/multiple_mzr_clusters/main.tf +++ b/examples/multiple_mzr_clusters/main.tf @@ -175,7 +175,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" { module "observability_instances" { source = "terraform-ibm-modules/observability-instances/ibm" - version = "2.13.2" + version = "2.14.0" providers = { logdna.at = logdna.at logdna.ld = logdna.ld @@ -197,7 +197,7 @@ module "observability_instances" { module "observability_agents_1" { source = "terraform-ibm-modules/observability-agents/ibm" - version = "1.28.3" + version = "1.28.4" providers = { helm = helm.helm_cluster_1 } @@ -211,7 +211,7 @@ module "observability_agents_1" { module "observability_agents_2" { source = "terraform-ibm-modules/observability-agents/ibm" - version = "1.28.3" + version = "1.28.4" providers = { helm = helm.helm_cluster_2 } diff --git a/main.tf b/main.tf index b6fd126b..97630770 100644 --- a/main.tf +++ b/main.tf @@ -85,7 +85,7 @@ module "cos_instance" { count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0 source = "terraform-ibm-modules/cos/ibm" - version = "8.9.1" + version = "8.10.0" cos_instance_name = local.cos_name resource_group_id = var.resource_group_id cos_plan = local.cos_plan