Skip to content

Commit 7992232

Browse files
fix(deps): update dependencies
1 parent 612495f commit 7992232

File tree

12 files changed

+47
-47
lines changed

12 files changed

+47
-47
lines changed

README.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ Optionally, the module supports advanced security group management for the worke
3030
* [kube-audit](./modules/kube-audit)
3131
* [worker-pool](./modules/worker-pool)
3232
* [Examples](./examples)
33-
* [2 MZR clusters in same VPC example](./examples/multiple_mzr_clusters)
34-
* [Advanced example (mzr, auto-scale, kms, taints)](./examples/advanced)
35-
* [Attaching custom security groups](./examples/custom_sg)
36-
* [Basic single zone cluster with allowed outbound traffic](./examples/basic)
37-
* [Cluster security group rules example](./examples/add_rules_to_sg)
38-
* [Cross account KMS encryption example](./examples/cross_kms_support)
39-
* [Financial Services compliant example](./examples/fscloud)
33+
* <div style="display: inline-block;"><a href="./examples/add_rules_to_sg">Cluster security group rules example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-add_rules_to_sg-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/add_rules_to_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
34+
* <div style="display: inline-block;"><a href="./examples/advanced">Advanced example (mzr, auto-scale, kms, taints)</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-advanced-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/advanced" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
35+
* <div style="display: inline-block;"><a href="./examples/basic">Basic single zone cluster with allowed outbound traffic</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-basic-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
36+
* <div style="display: inline-block;"><a href="./examples/cross_kms_support">Cross account KMS encryption example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-cross_kms_support-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/cross_kms_support" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
37+
* <div style="display: inline-block;"><a href="./examples/custom_sg">Attaching custom security groups</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-custom_sg-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/custom_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
38+
* <div style="display: inline-block;"><a href="./examples/fscloud">Financial Services compliant example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-fscloud-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/fscloud" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
39+
* <div style="display: inline-block;"><a href="./examples/multiple_mzr_clusters">2 MZR clusters in same VPC example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-multiple_mzr_clusters-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/multiple_mzr_clusters" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
4040
* [Contributing](#contributing)
4141
<!-- END OVERVIEW HOOK -->
4242

@@ -302,9 +302,9 @@ Optionally, you need the following permissions to attach Access Management tags
302302
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
303303
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
304304
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
305-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.7 |
306-
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.5.1 |
307-
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
305+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 |
306+
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.5.7 |
307+
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 |
308308
| <a name="module_worker_pools"></a> [worker\_pools](#module\_worker\_pools) | ./modules/worker-pool | n/a |
309309
310310
### Resources

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.4.5"
25+
version = "5.4.10"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
@@ -234,7 +234,7 @@ locals {
234234

235235
module "cloud_logs" {
236236
source = "terraform-ibm-modules/cloud-logs/ibm"
237-
version = "1.9.5"
237+
version = "1.9.11"
238238
resource_group_id = module.resource_group.resource_group_id
239239
region = var.region
240240
plan = "standard"
@@ -270,7 +270,7 @@ module "trusted_profile" {
270270
module "logs_agents" {
271271
depends_on = [module.kube_audit]
272272
source = "terraform-ibm-modules/logs-agent/ibm"
273-
version = "1.10.0"
273+
version = "1.13.0"
274274
cluster_id = module.ocp_base.cluster_id
275275
cluster_resource_group_id = module.resource_group.resource_group_id
276276
logs_agent_trusted_profile_id = module.trusted_profile.trusted_profile.id

examples/fscloud/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos_fscloud" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "10.5.1"
19+
version = "10.5.7"
2020
resource_group_id = module.resource_group.resource_group_id
2121
create_cos_bucket = false
2222
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
3030

3131
module "flowlogs_bucket" {
3232
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
33-
version = "10.5.1"
33+
version = "10.5.7"
3434

3535
bucket_configs = [
3636
{
@@ -52,7 +52,7 @@ module "flowlogs_bucket" {
5252
module "vpc" {
5353
depends_on = [module.flowlogs_bucket]
5454
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
55-
version = "8.7.0"
55+
version = "8.8.4"
5656
resource_group_id = module.resource_group.resource_group_id
5757
region = var.region
5858
prefix = var.prefix
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
112112

113113
module "cbr_vpc_zone" {
114114
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
115-
version = "1.33.7"
115+
version = "1.33.8"
116116
name = "${var.prefix}-VPC-network-zone"
117117
zone_description = "CBR Network zone representing VPC"
118118
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
124124

125125
module "cbr_zone_schematics" {
126126
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
127-
version = "1.33.7"
127+
version = "1.33.8"
128128
name = "${var.prefix}-schematics-zone"
129129
zone_description = "CBR Network zone containing Schematics"
130130
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
139139

140140
module "cbr_rules" {
141141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
142-
version = "1.33.7"
142+
version = "1.33.8"
143143
rule_description = "${var.prefix} rule for vpc flow log access to cos"
144144
enforcement_mode = "enabled"
145145
resources = [{

examples/multiple_mzr_clusters/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
173173

174174
module "monitoring_instance" {
175175
source = "terraform-ibm-modules/cloud-monitoring/ibm"
176-
version = "1.10.2"
176+
version = "1.10.8"
177177
resource_group_id = module.resource_group.resource_group_id
178178
region = var.region
179179
plan = "graduated-tier"
@@ -190,7 +190,7 @@ module "monitoring_agent_1" {
190190
helm = helm.helm_cluster_1
191191
}
192192
source = "terraform-ibm-modules/monitoring-agent/ibm"
193-
version = "1.12.0"
193+
version = "1.13.0"
194194
cluster_id = module.ocp_base_cluster_1.cluster_id
195195
cluster_resource_group_id = module.resource_group.resource_group_id
196196
access_key = module.monitoring_instance.access_key
@@ -202,7 +202,7 @@ module "monitoring_agent_2" {
202202
helm = helm.helm_cluster_2
203203
}
204204
source = "terraform-ibm-modules/monitoring-agent/ibm"
205-
version = "1.12.0"
205+
version = "1.13.0"
206206
cluster_id = module.ocp_base_cluster_2.cluster_id
207207
cluster_resource_group_id = module.resource_group.resource_group_id
208208
access_key = module.monitoring_instance.access_key

main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ module "cos_instance" {
109109
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
110110

111111
source = "terraform-ibm-modules/cos/ibm"
112-
version = "10.5.1"
112+
version = "10.5.7"
113113
cos_instance_name = local.cos_name
114114
resource_group_id = var.resource_group_id
115115
cos_plan = local.cos_plan
@@ -706,7 +706,7 @@ locals {
706706
module "cbr_rule" {
707707
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
708708
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
709-
version = "1.33.7"
709+
version = "1.33.8"
710710
rule_description = var.cbr_rules[count.index].description
711711
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
712712
rule_contexts = var.cbr_rules[count.index].rule_contexts
@@ -739,7 +739,7 @@ module "cbr_rule" {
739739
module "existing_secrets_manager_instance_parser" {
740740
count = var.enable_secrets_manager_integration ? 1 : 0
741741
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
742-
version = "1.2.0"
742+
version = "1.3.0"
743743
crn = var.existing_secrets_manager_instance_crn
744744
}
745745

solutions/fully-configurable/main.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,21 @@ module "resource_group" {
1414
module "existing_kms_crn_parser" {
1515
count = var.existing_kms_instance_crn != null ? 1 : 0
1616
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
17-
version = "1.2.0"
17+
version = "1.3.0"
1818
crn = var.existing_kms_instance_crn
1919
}
2020

2121
module "existing_cluster_kms_key_crn_parser" {
2222
count = var.existing_cluster_kms_key_crn != null ? 1 : 0
2323
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
24-
version = "1.2.0"
24+
version = "1.3.0"
2525
crn = var.existing_cluster_kms_key_crn
2626
}
2727

2828
module "existing_boot_volume_kms_key_crn_parser" {
2929
count = var.existing_boot_volume_kms_key_crn != null ? 1 : 0
3030
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
31-
version = "1.2.0"
31+
version = "1.3.0"
3232
crn = var.existing_boot_volume_kms_key_crn
3333
}
3434

@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.4.5"
98+
version = "5.4.10"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -109,7 +109,7 @@ module "kms" {
109109
########################################################################################################################
110110
module "existing_vpc_crn_parser" {
111111
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
112-
version = "1.2.0"
112+
version = "1.3.0"
113113
crn = var.existing_vpc_crn
114114
}
115115

@@ -244,7 +244,7 @@ module "ocp_base" {
244244
module "existing_secrets_manager_instance_parser" {
245245
count = var.enable_secrets_manager_integration ? 1 : 0
246246
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
247-
version = "1.2.0"
247+
version = "1.3.0"
248248
crn = var.existing_secrets_manager_instance_crn
249249
}
250250

@@ -279,7 +279,7 @@ module "secret_group" {
279279
}
280280
count = var.enable_secrets_manager_integration && var.secrets_manager_secret_group_id == null ? 1 : 0
281281
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
282-
version = "1.3.15"
282+
version = "1.3.16"
283283
region = module.existing_secrets_manager_instance_parser[0].region
284284
secrets_manager_guid = module.existing_secrets_manager_instance_parser[0].service_instance
285285
secret_group_name = module.ocp_base.cluster_id

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ terraform {
99
}
1010
helm = {
1111
source = "hashicorp/helm"
12-
version = "3.0.2"
12+
version = "3.1.0"
1313
}
1414
kubernetes = {
1515
source = "hashicorp/kubernetes"

solutions/quickstart/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ locals {
6767

6868
module "vpc" {
6969
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
70-
version = "8.7.0"
70+
version = "8.8.4"
7171
resource_group_id = module.resource_group.resource_group_id
7272
region = var.region
7373
name = "vpc"

tests/existing-resources/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ module "resource_group" {
1414

1515
module "vpc" {
1616
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
17-
version = "8.7.0"
17+
version = "8.8.4"
1818
resource_group_id = module.resource_group.resource_group_id
1919
region = var.region
2020
name = "vpc"
@@ -54,7 +54,7 @@ module "vpc" {
5454

5555
module "cos" {
5656
source = "terraform-ibm-modules/cos/ibm"
57-
version = "10.5.1"
57+
version = "10.5.7"
5858
resource_group_id = module.resource_group.resource_group_id
5959
region = var.region
6060
cos_instance_name = "${var.prefix}-cos"

0 commit comments

Comments
 (0)