File tree Expand file tree Collapse file tree 9 files changed +17
-17
lines changed Expand file tree Collapse file tree 9 files changed +17
-17
lines changed Original file line number Diff line number Diff line change @@ -141,8 +141,8 @@ You need the following permissions to run this module.
141
141
142
142
| Name | Source | Version |
143
143
| ------| --------| ---------|
144
- | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.0 |
145
- | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.0 |
144
+ | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.1 |
145
+ | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.1 |
146
146
147
147
### Resources
148
148
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.4 "
7
+ version = " 1.1.5 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -52,7 +52,7 @@ locals {
52
52
# Create Sysdig and Activity Tracker instance
53
53
module "observability_instances" {
54
54
source = " terraform-ibm-modules/observability-instances/ibm"
55
- version = " 2.11.0 "
55
+ version = " 2.11.1 "
56
56
providers = {
57
57
logdna.at = logdna.at
58
58
logdna.ld = logdna.ld
@@ -83,7 +83,7 @@ locals {
83
83
84
84
module "key_protect_all_inclusive" {
85
85
source = " terraform-ibm-modules/key-protect-all-inclusive/ibm"
86
- version = " 4.7.0 "
86
+ version = " 4.8.2 "
87
87
key_protect_instance_name = " ${ var . prefix } -kp"
88
88
resource_group_id = module. resource_group . resource_group_id
89
89
enable_metrics = false
@@ -114,7 +114,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
114
114
115
115
module "cbr_zone" {
116
116
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
117
- version = " 1.19.0 "
117
+ version = " 1.19.1 "
118
118
name = " ${ var . prefix } -VPC-network-zone"
119
119
zone_description = " CBR Network zone containing VPC"
120
120
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.4 "
7
+ version = " 1.1.5 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.4 "
7
+ version = " 1.1.5 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -40,7 +40,7 @@ locals {
40
40
# Create Sysdig and Activity Tracker instance
41
41
module "observability_instances" {
42
42
source = " terraform-ibm-modules/observability-instances/ibm"
43
- version = " 2.11.0 "
43
+ version = " 2.11.1 "
44
44
providers = {
45
45
logdna.at = logdna.at
46
46
logdna.ld = logdna.ld
@@ -73,7 +73,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
73
73
74
74
module "cbr_zone" {
75
75
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
76
- version = " 1.19.0 "
76
+ version = " 1.19.1 "
77
77
name = " ${ var . prefix } -VPC-fscloud-nz"
78
78
zone_description = " CBR Network zone containing VPC"
79
79
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -86,7 +86,7 @@ module "cbr_zone" {
86
86
# Allow schematics, from outside VPC, to manage resources
87
87
module "cbr_zone_schematics" {
88
88
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
89
- version = " 1.19.0 "
89
+ version = " 1.19.1 "
90
90
name = " ${ var . prefix } -schematics-fscloud-nz"
91
91
zone_description = " CBR Network zone containing Schematics"
92
92
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.4 "
7
+ version = " 1.1.5 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.4 "
7
+ version = " 1.1.5 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -302,7 +302,7 @@ locals {
302
302
module "bucket_cbr_rule" {
303
303
count = (length (var. bucket_cbr_rules ) > 0 && var. create_cos_bucket ) ? length (var. bucket_cbr_rules ) : 0
304
304
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
305
- version = " 1.19.0 "
305
+ version = " 1.19.1 "
306
306
rule_description = var. bucket_cbr_rules [count . index ]. description
307
307
enforcement_mode = var. bucket_cbr_rules [count . index ]. enforcement_mode
308
308
rule_contexts = var. bucket_cbr_rules [count . index ]. rule_contexts
@@ -337,7 +337,7 @@ module "bucket_cbr_rule" {
337
337
module "instance_cbr_rule" {
338
338
count = length (var. instance_cbr_rules )
339
339
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
340
- version = " 1.19.0 "
340
+ version = " 1.19.1 "
341
341
rule_description = var. instance_cbr_rules [count . index ]. description
342
342
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
343
343
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -84,7 +84,7 @@ module "cos_fscloud" {
84
84
| ------| --------| ---------|
85
85
| <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | ../../modules/buckets | n/a |
86
86
| <a name =" module_cos_instance " ></a > [ cos\_ instance] ( #module\_ cos\_ instance ) | ../../ | n/a |
87
- | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.0 |
87
+ | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.1 |
88
88
89
89
### Resources
90
90
Original file line number Diff line number Diff line change @@ -80,7 +80,7 @@ module "instance_cbr_rules" {
80
80
depends_on = [module . buckets ]
81
81
count = length (var. instance_cbr_rules )
82
82
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
83
- version = " 1.19.0 "
83
+ version = " 1.19.1 "
84
84
rule_description = var. instance_cbr_rules [count . index ]. description
85
85
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
86
86
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
You can’t perform that action at this time.
0 commit comments