diff --git a/solutions/agents/main.tf b/solutions/agents/main.tf index ce22e4ed..10c01b0d 100644 --- a/solutions/agents/main.tf +++ b/solutions/agents/main.tf @@ -11,7 +11,7 @@ data "ibm_container_cluster_config" "cluster_config" { module "observability_agents" { source = "terraform-ibm-modules/observability-agents/ibm" - version = "2.3.3" + version = "2.3.6" cluster_id = var.cluster_id cluster_resource_group_id = var.cluster_resource_group_id cluster_config_endpoint_type = var.cluster_config_endpoint_type diff --git a/solutions/instances/main.tf b/solutions/instances/main.tf index ac62605c..efb0a857 100644 --- a/solutions/instances/main.tf +++ b/solutions/instances/main.tf @@ -228,21 +228,21 @@ resource "ibm_iam_authorization_policy" "cos_policy" { module "en_crn_parser" { count = length(local.cloud_logs_existing_en_instances) source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = local.cloud_logs_existing_en_instances[count.index]["instance_crn"] } module "cloud_monitoring_crn_parser" { count = var.existing_cloud_monitoring_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_cloud_monitoring_crn } module "observability_instance" { depends_on = [time_sleep.wait_for_atracker_cos_authorization_policy] source = "terraform-ibm-modules/observability-instances/ibm" - version = "3.3.1" + version = "3.4.0" region = var.region resource_group_id = module.resource_group.resource_group_id @@ -359,7 +359,7 @@ module "kms" { } count = (var.existing_cos_kms_key_crn != null || (length(coalesce(local.buckets_config, [])) == 0)) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.15.13" + version = "4.19.1" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -449,7 +449,7 @@ module "cos_instance" { } count = var.existing_cos_instance_crn == null && length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS instance source = "terraform-ibm-modules/cos/ibm//modules/fscloud" - version = "8.14.1" + version = "8.16.4" resource_group_id = local.cos_resource_group_id create_cos_instance = true cos_instance_name = var.prefix != null ? "${var.prefix}-${var.cos_instance_name}" : var.cos_instance_name @@ -466,7 +466,7 @@ module "cos_bucket" { } count = length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS bucket source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.14.1" + version = "8.16.4" bucket_configs = [ for value in local.buckets_config : { diff --git a/tests/resources/existing-resources/main.tf b/tests/resources/existing-resources/main.tf index 9478d2e5..b4b3e4bf 100644 --- a/tests/resources/existing-resources/main.tf +++ b/tests/resources/existing-resources/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.11.11" + version = "8.16.4" resource_group_id = module.resource_group.resource_group_id region = var.region cos_instance_name = "${var.prefix}-cos" @@ -28,7 +28,7 @@ module "cos" { module "additional_cos_bucket" { source = "terraform-ibm-modules/cos/ibm" - version = "8.11.11" + version = "8.16.4" region = var.region create_cos_instance = false existing_cos_instance_id = module.cos.cos_instance_id @@ -38,7 +38,7 @@ module "additional_cos_bucket" { module "cloud_log_buckets" { source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.6.2" + version = "8.16.4" bucket_configs = [ { bucket_name = "${var.prefix}-data-bucket" @@ -65,7 +65,7 @@ module "cloud_log_buckets" { module "event_notification_1" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "1.6.5" + version = "1.15.11" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en-1" tags = var.resource_tags @@ -76,7 +76,7 @@ module "event_notification_1" { module "event_notification_2" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "1.6.5" + version = "1.15.11" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en-2" tags = var.resource_tags diff --git a/tests/resources/main.tf b/tests/resources/main.tf index 0a071416..1c9d3a4c 100644 --- a/tests/resources/main.tf +++ b/tests/resources/main.tf @@ -15,7 +15,7 @@ module "resource_group" { ############################################################################## module "landing_zone" { - source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.0.1" + source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.6.3" region = var.region prefix = var.prefix tags = var.resource_tags @@ -33,7 +33,7 @@ module "landing_zone" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.11.14" + version = "8.16.4" resource_group_id = module.resource_group.resource_group_id cos_instance_name = "${var.prefix}-cos" cos_tags = var.resource_tags @@ -51,7 +51,7 @@ locals { module "buckets" { source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.11.14" + version = "8.16.4" bucket_configs = [ { bucket_name = local.logs_bucket_name @@ -81,7 +81,7 @@ locals { module "observability_instances" { source = "terraform-ibm-modules/observability-instances/ibm" - version = "3.0.2" + version = "3.4.0" resource_group_id = local.cluster_resource_group_id region = var.region cloud_monitoring_plan = "graduated-tier" @@ -117,7 +117,7 @@ locals { module "trusted_profile" { source = "terraform-ibm-modules/trusted-profile/ibm" - version = "1.0.4" + version = "1.0.5" trusted_profile_name = "${var.prefix}-profile" trusted_profile_description = "Logs agent Trusted Profile" # As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.