This repository was archived by the owner on May 28, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 7 files changed +14
-14
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 7 files changed +14
-14
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616module "cos" {
1717 count = var. existing_scc_instance_crn == null ? 1 : 0
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.21 "
19+ version = " 8.21.24 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -45,7 +45,7 @@ module "event_notification" {
4545
4646module "scc_wp" {
4747 source = " terraform-ibm-modules/scc-workload-protection/ibm"
48- version = " 1.5.10 "
48+ version = " 1.5.12 "
4949 name = " ${ var . prefix } -wp"
5050 region = var. region
5151 resource_group_id = module. resource_group . resource_group_id
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ module "resource_group" {
77
88module "cos" {
99 source = " terraform-ibm-modules/cos/ibm"
10- version = " 8.21.21 "
10+ version = " 8.21.24 "
1111 cos_instance_name = " ${ var . prefix } -cos"
1212 kms_encryption_enabled = false
1313 retention_enabled = false
Original file line number Diff line number Diff line change @@ -29,13 +29,13 @@ This solution supports provisioning and configuring the following infrastructure
2929
3030| Name | Source | Version |
3131| ------| --------| ---------|
32- | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.21 |
32+ | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.24 |
3333| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3535| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3636| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3737| <a name =" module_existing_scc_crn_parser " ></a > [ existing\_ scc\_ crn\_ parser] ( #module\_ existing\_ scc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
38- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.2 |
38+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.5 |
3939| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
4040| <a name =" module_scc " ></a > [ scc] ( #module\_ scc ) | ../.. | n/a |
4141| <a name =" module_scc_attachment " ></a > [ scc\_ attachment] ( #module\_ scc\_ attachment ) | ../../modules/attachment | n/a |
Original file line number Diff line number Diff line change @@ -100,7 +100,7 @@ module "kms" {
100100 }
101101 count = var. existing_scc_instance_crn == null && var. kms_encryption_enabled_bucket && var. existing_kms_key_crn == null ? 1 : 0
102102 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
103- version = " 5.1.2 "
103+ version = " 5.1.5 "
104104 create_key_protect_instance = false
105105 region = local. kms_region
106106 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -171,7 +171,7 @@ module "buckets" {
171171 count = var. existing_scc_instance_crn == null ? 1 : 0
172172 depends_on = [time_sleep . wait_for_authorization_policy [0 ]]
173173 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
174- version = " 8.21.21 "
174+ version = " 8.21.24 "
175175 bucket_configs = local. bucket_config
176176}
177177
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.21 "
19+ version = " 8.21.24 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "scc" {
3232 source = " terraform-ibm-modules/scc/ibm"
33- version = " 2.1.17 "
33+ version = " 2.1.18 "
3434 instance_name = var. prefix
3535 region = var. region
3636 resource_group_id = module. resource_group . resource_group_id
@@ -45,7 +45,7 @@ module "scc" {
4545
4646module "scc_wp" {
4747 source = " terraform-ibm-modules/scc-workload-protection/ibm"
48- version = " 1.5.10 "
48+ version = " 1.5.12 "
4949 name = var. prefix
5050 region = var. region
5151 resource_group_id = module. resource_group . resource_group_id
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "key_protect" {
1818 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
19- version = " 5.1.2 "
19+ version = " 5.1.5 "
2020 key_protect_instance_name = " ${ var . prefix } -key-protect"
2121 resource_group_id = module. resource_group . resource_group_id
2222 region = var. region
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.21 "
19+ version = " 8.21.24 "
2020 resource_group_id = module. resource_group . resource_group_id
2121 cos_instance_name = " ${ var . prefix } -cos"
2222 cos_tags = var. resource_tags
@@ -29,7 +29,7 @@ module "cos" {
2929
3030module "scc_wp" {
3131 source = " terraform-ibm-modules/scc-workload-protection/ibm"
32- version = " 1.5.10 "
32+ version = " 1.5.12 "
3333 name = var. prefix
3434 region = var. region
3535 resource_group_id = module. resource_group . resource_group_id
@@ -42,7 +42,7 @@ module "scc_wp" {
4242
4343module "cloud_monitoring" {
4444 source = " terraform-ibm-modules/observability-instances/ibm//modules/cloud_monitoring"
45- version = " 3.5.2 "
45+ version = " 3.5.3 "
4646 resource_group_id = module. resource_group . resource_group_id
4747 region = var. region
4848 instance_name = " ${ var . prefix } -mon"
You can’t perform that action at this time.
0 commit comments