Skip to content

Commit

Permalink
fix(deps): update terraform-module (#161)
Browse files Browse the repository at this point in the history
  • Loading branch information
terraform-ibm-modules-ops authored Jan 20, 2025
1 parent c4543db commit 23746d1
Show file tree
Hide file tree
Showing 4 changed files with 17 additions and 17 deletions.
2 changes: 1 addition & 1 deletion solutions/agents/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ data "ibm_container_cluster_config" "cluster_config" {

module "observability_agents" {
source = "terraform-ibm-modules/observability-agents/ibm"
version = "2.3.3"
version = "2.3.6"
cluster_id = var.cluster_id
cluster_resource_group_id = var.cluster_resource_group_id
cluster_config_endpoint_type = var.cluster_config_endpoint_type
Expand Down
12 changes: 6 additions & 6 deletions solutions/instances/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -228,21 +228,21 @@ resource "ibm_iam_authorization_policy" "cos_policy" {
module "en_crn_parser" {
count = length(local.cloud_logs_existing_en_instances)
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
version = "1.0.0"
version = "1.1.0"
crn = local.cloud_logs_existing_en_instances[count.index]["instance_crn"]
}

module "cloud_monitoring_crn_parser" {
count = var.existing_cloud_monitoring_crn != null ? 1 : 0
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
version = "1.0.0"
version = "1.1.0"
crn = var.existing_cloud_monitoring_crn
}

module "observability_instance" {
depends_on = [time_sleep.wait_for_atracker_cos_authorization_policy]
source = "terraform-ibm-modules/observability-instances/ibm"
version = "3.3.1"
version = "3.4.0"
region = var.region
resource_group_id = module.resource_group.resource_group_id

Expand Down Expand Up @@ -359,7 +359,7 @@ module "kms" {
}
count = (var.existing_cos_kms_key_crn != null || (length(coalesce(local.buckets_config, [])) == 0)) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
version = "4.15.13"
version = "4.19.1"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
Expand Down Expand Up @@ -449,7 +449,7 @@ module "cos_instance" {
}
count = var.existing_cos_instance_crn == null && length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS instance
source = "terraform-ibm-modules/cos/ibm//modules/fscloud"
version = "8.14.1"
version = "8.16.4"
resource_group_id = local.cos_resource_group_id
create_cos_instance = true
cos_instance_name = var.prefix != null ? "${var.prefix}-${var.cos_instance_name}" : var.cos_instance_name
Expand All @@ -466,7 +466,7 @@ module "cos_bucket" {
}
count = length(coalesce(local.buckets_config, [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS bucket
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
version = "8.14.1"
version = "8.16.4"
bucket_configs = [
for value in local.buckets_config :
{
Expand Down
10 changes: 5 additions & 5 deletions tests/resources/existing-resources/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ module "resource_group" {

module "cos" {
source = "terraform-ibm-modules/cos/ibm"
version = "8.11.11"
version = "8.16.4"
resource_group_id = module.resource_group.resource_group_id
region = var.region
cos_instance_name = "${var.prefix}-cos"
Expand All @@ -28,7 +28,7 @@ module "cos" {

module "additional_cos_bucket" {
source = "terraform-ibm-modules/cos/ibm"
version = "8.11.11"
version = "8.16.4"
region = var.region
create_cos_instance = false
existing_cos_instance_id = module.cos.cos_instance_id
Expand All @@ -38,7 +38,7 @@ module "additional_cos_bucket" {

module "cloud_log_buckets" {
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
version = "8.6.2"
version = "8.16.4"
bucket_configs = [
{
bucket_name = "${var.prefix}-data-bucket"
Expand All @@ -65,7 +65,7 @@ module "cloud_log_buckets" {

module "event_notification_1" {
source = "terraform-ibm-modules/event-notifications/ibm"
version = "1.6.5"
version = "1.15.11"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en-1"
tags = var.resource_tags
Expand All @@ -76,7 +76,7 @@ module "event_notification_1" {

module "event_notification_2" {
source = "terraform-ibm-modules/event-notifications/ibm"
version = "1.6.5"
version = "1.15.11"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en-2"
tags = var.resource_tags
Expand Down
10 changes: 5 additions & 5 deletions tests/resources/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ module "resource_group" {
##############################################################################

module "landing_zone" {
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.0.1"
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone//patterns//roks//module?ref=v6.6.3"
region = var.region
prefix = var.prefix
tags = var.resource_tags
Expand All @@ -33,7 +33,7 @@ module "landing_zone" {

module "cos" {
source = "terraform-ibm-modules/cos/ibm"
version = "8.11.14"
version = "8.16.4"
resource_group_id = module.resource_group.resource_group_id
cos_instance_name = "${var.prefix}-cos"
cos_tags = var.resource_tags
Expand All @@ -51,7 +51,7 @@ locals {

module "buckets" {
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
version = "8.11.14"
version = "8.16.4"
bucket_configs = [
{
bucket_name = local.logs_bucket_name
Expand Down Expand Up @@ -81,7 +81,7 @@ locals {

module "observability_instances" {
source = "terraform-ibm-modules/observability-instances/ibm"
version = "3.0.2"
version = "3.4.0"
resource_group_id = local.cluster_resource_group_id
region = var.region
cloud_monitoring_plan = "graduated-tier"
Expand Down Expand Up @@ -117,7 +117,7 @@ locals {

module "trusted_profile" {
source = "terraform-ibm-modules/trusted-profile/ibm"
version = "1.0.4"
version = "1.0.5"
trusted_profile_name = "${var.prefix}-profile"
trusted_profile_description = "Logs agent Trusted Profile"
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
Expand Down

0 comments on commit 23746d1

Please sign in to comment.