diff --git a/README.md b/README.md
index a3e9cfc3..b1e1ec09 100644
--- a/README.md
+++ b/README.md
@@ -207,7 +207,7 @@ Optionally, you need the following permissions to attach Access Management tags
| [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
| [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
-| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.9.1 |
+| [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.10.0 |
### Resources
diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index 99de8109..c7e292b0 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -22,7 +22,7 @@ locals {
module "kp_all_inclusive" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "4.15.2"
+ version = "4.15.4"
key_protect_instance_name = "${var.prefix}-kp-instance"
resource_group_id = module.resource_group.resource_group_id
region = var.region
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index 13f49003..3097bfd6 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos_fscloud" {
source = "terraform-ibm-modules/cos/ibm"
- version = "8.9.1"
+ version = "8.10.0"
resource_group_id = module.resource_group.resource_group_id
create_cos_bucket = false
cos_instance_name = "${var.prefix}-cos"
@@ -32,7 +32,7 @@ module "cos_fscloud" {
module "flowlogs_bucket" {
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
- version = "8.9.1"
+ version = "8.10.0"
bucket_configs = [
{
@@ -113,7 +113,7 @@ locals {
# Create Sysdig and Activity Tracker instance
module "observability_instances" {
source = "terraform-ibm-modules/observability-instances/ibm"
- version = "2.13.2"
+ version = "2.14.0"
providers = {
logdna.at = logdna.at
logdna.ld = logdna.ld
@@ -144,7 +144,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
module "cbr_zone" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.23.1"
+ version = "1.23.5"
name = "${var.prefix}-VPC-network-zone"
zone_description = "CBR Network zone containing VPC"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -156,7 +156,7 @@ module "cbr_zone" {
module "cbr_rules" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.23.1"
+ version = "1.23.5"
rule_description = "${var.prefix} rule for vpc flow log access to cos"
enforcement_mode = "enabled"
resources = [{
diff --git a/examples/multiple_mzr_clusters/main.tf b/examples/multiple_mzr_clusters/main.tf
index 30db4650..e2d4c7f4 100644
--- a/examples/multiple_mzr_clusters/main.tf
+++ b/examples/multiple_mzr_clusters/main.tf
@@ -175,7 +175,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
module "observability_instances" {
source = "terraform-ibm-modules/observability-instances/ibm"
- version = "2.13.2"
+ version = "2.14.0"
providers = {
logdna.at = logdna.at
logdna.ld = logdna.ld
@@ -197,7 +197,7 @@ module "observability_instances" {
module "observability_agents_1" {
source = "terraform-ibm-modules/observability-agents/ibm"
- version = "1.28.3"
+ version = "1.28.4"
providers = {
helm = helm.helm_cluster_1
}
@@ -211,7 +211,7 @@ module "observability_agents_1" {
module "observability_agents_2" {
source = "terraform-ibm-modules/observability-agents/ibm"
- version = "1.28.3"
+ version = "1.28.4"
providers = {
helm = helm.helm_cluster_2
}
diff --git a/main.tf b/main.tf
index b6fd126b..97630770 100644
--- a/main.tf
+++ b/main.tf
@@ -85,7 +85,7 @@ module "cos_instance" {
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
source = "terraform-ibm-modules/cos/ibm"
- version = "8.9.1"
+ version = "8.10.0"
cos_instance_name = local.cos_name
resource_group_id = var.resource_group_id
cos_plan = local.cos_plan