@@ -245,7 +245,7 @@ module "cloud_monitoring_crn_parser" {
245
245
module "cloud_monitoring" {
246
246
count = var. cloud_monitoring_provision ? 1 : 0
247
247
source = " terraform-ibm-modules/cloud-monitoring/ibm"
248
- version = " 1.5 .0"
248
+ version = " 1.6 .0"
249
249
region = var. region
250
250
resource_group_id = module. resource_group . resource_group_id
251
251
instance_name = local. cloud_monitoring_instance_name
@@ -259,7 +259,7 @@ module "cloud_monitoring" {
259
259
module "cloud_logs" {
260
260
count = var. cloud_logs_provision ? 1 : 0
261
261
source = " terraform-ibm-modules/cloud-logs/ibm"
262
- version = " 1.5.11 "
262
+ version = " 1.6.0 "
263
263
region = var. region
264
264
resource_group_id = module. resource_group . resource_group_id
265
265
instance_name = local. cloud_logs_instance_name
@@ -304,7 +304,7 @@ module "cloud_logs" {
304
304
305
305
module "metrics_router" {
306
306
source = " terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing"
307
- version = " 1.5 .0"
307
+ version = " 1.6 .0"
308
308
metrics_router_targets = var. enable_metrics_routing_to_cloud_monitoring ? [
309
309
{
310
310
destination_crn = var.cloud_monitoring_provision ? module.cloud_monitoring[0 ].crn : var.existing_cloud_monitoring_crn
@@ -320,7 +320,7 @@ module "metrics_router" {
320
320
module "activity_tracker" {
321
321
depends_on = [time_sleep . wait_for_atracker_cos_authorization_policy ]
322
322
source = " terraform-ibm-modules/activity-tracker/ibm"
323
- version = " 1.1.7 "
323
+ version = " 1.2.0 "
324
324
cos_targets = var. enable_at_event_routing_to_cos_bucket ? [
325
325
{
326
326
bucket_name = local.cos_target_bucket_name
@@ -376,7 +376,7 @@ module "kms" {
376
376
}
377
377
count = (var. existing_cos_kms_key_crn != null || (length (coalesce (local. buckets_config , [])) == 0 )) ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
378
378
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
379
- version = " 5.1.13 "
379
+ version = " 5.1.14 "
380
380
create_key_protect_instance = false
381
381
region = local. kms_region
382
382
existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -466,7 +466,7 @@ module "cos_instance" {
466
466
}
467
467
count = var. existing_cos_instance_crn == null && length (coalesce (local. buckets_config , [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS instance
468
468
source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
469
- version = " 10.1.1 "
469
+ version = " 10.1.16 "
470
470
resource_group_id = local. cos_resource_group_id
471
471
create_cos_instance = true
472
472
cos_instance_name = try (" ${ local . prefix } -${ var . cos_instance_name } " , var. cos_instance_name )
@@ -483,7 +483,7 @@ module "cos_bucket" {
483
483
}
484
484
count = length (coalesce (local. buckets_config , [])) != 0 ? 1 : 0 # no need to call COS module if consumer is using existing COS bucket
485
485
source = " terraform-ibm-modules/cos/ibm//modules/buckets"
486
- version = " 10.1.1 "
486
+ version = " 10.1.16 "
487
487
bucket_configs = [
488
488
for value in local . buckets_config :
489
489
{
0 commit comments