Skip to content

Commit f1acf9d

Browse files
fix(deps): update dependencies (#253)
1 parent f0d8d99 commit f1acf9d

File tree

11 files changed

+45
-45
lines changed

11 files changed

+45
-45
lines changed

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.0
1212
secrets: inherit

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ No modules.
111111
| <a name="input_access_key"></a> [access\_key](#input\_access\_key) | Access key used by the agent to communicate with the instance. Either `access_key` or `existing_access_key_secret_name` is required. This value will be stored in a new secret on the cluster if passed. If you want to use this agent for only metrics or metrics with security and compliance, use a manager key scoped to the IBM Cloud Monitoring instance. If you only want to use the agent for security and compliance use a manager key scoped to the Security and Compliance Center Workload Protection instance. | `string` | `null` | no |
112112
| <a name="input_add_cluster_name"></a> [add\_cluster\_name](#input\_add\_cluster\_name) | If true, configure the agent to associate a tag containing the cluster name. This tag is added in the format `ibm-containers-kubernetes-cluster-name: cluster_name`. | `bool` | `true` | no |
113113
| <a name="input_agent_image_repository"></a> [agent\_image\_repository](#input\_agent\_image\_repository) | The image repository to pull the agent image from. | `string` | `"agent-slim"` | no |
114-
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. | `string` | `"14.2.3@sha256:cb2c437afde546554e04dbc018c125c6ffb60a9878ce6b45a29d769d91782c4b"` | no |
114+
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. | `string` | `"14.2.4@sha256:c8e6924999390de58471c2ac82b211a0207a50047a1bd15654a678f2b3d1e26e"` | no |
115115
| <a name="input_agent_limits_cpu"></a> [agent\_limits\_cpu](#input\_agent\_limits\_cpu) | Specify CPU resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
116116
| <a name="input_agent_limits_memory"></a> [agent\_limits\_memory](#input\_agent\_limits\_memory) | Specify memory resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1024Mi"` | no |
117117
| <a name="input_agent_requests_cpu"></a> [agent\_requests\_cpu](#input\_agent\_requests\_cpu) | Specify CPU resource requests for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
@@ -120,7 +120,7 @@ No modules.
120120
| <a name="input_blacklisted_ports"></a> [blacklisted\_ports](#input\_blacklisted\_ports) | To block network traffic and metrics from network ports, pass the list of ports from which you want to filter out any data. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_agent#ports | `list(number)` | `[]` | no |
121121
| <a name="input_chart"></a> [chart](#input\_chart) | The name of the Helm chart to deploy. Use `chart_location` to specify helm chart location. | `string` | `"sysdig-deploy"` | no |
122122
| <a name="input_chart_location"></a> [chart\_location](#input\_chart\_location) | The location of the agent helm chart. | `string` | `"https://charts.sysdig.com"` | no |
123-
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.96.0"` | no |
123+
| <a name="input_chart_version"></a> [chart\_version](#input\_chart\_version) | The version of the agent helm chart to deploy. | `string` | `"1.96.4"` | no |
124124
| <a name="input_cluster_config_endpoint_type"></a> [cluster\_config\_endpoint\_type](#input\_cluster\_config\_endpoint\_type) | Specify which type of endpoint to use for for cluster config access: 'default', 'private', 'vpe', 'link'. 'default' value will use the default endpoint of the cluster. | `string` | `"default"` | no |
125125
| <a name="input_cluster_id"></a> [cluster\_id](#input\_cluster\_id) | The ID of the cluster you wish to deploy the agent in. | `string` | n/a | yes |
126126
| <a name="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id) | The resource group ID of the cluster. | `string` | n/a | yes |
@@ -142,7 +142,7 @@ No modules.
142142
| <a name="input_instance_region"></a> [instance\_region](#input\_instance\_region) | The region of the IBM Cloud Monitoring instance that you want to send metrics to. The region value is used to construct the ingestion and api endpoints. If you are only using the agent for security and compliance monitoring, set this to the region of your IBM Cloud Security and Compliance Center Workload Protection instance. If you have both Cloud Monitoring and Security and Compliance Center Workload Protection instances, the instances must be connected and must be in the same region to use the same agent. | `string` | n/a | yes |
143143
| <a name="input_is_vpc_cluster"></a> [is\_vpc\_cluster](#input\_is\_vpc\_cluster) | Specify true if the target cluster is a VPC cluster, false if it is a classic cluster. | `bool` | `true` | no |
144144
| <a name="input_kernel_module_image_repository"></a> [kernel\_module\_image\_repository](#input\_kernel\_module\_image\_repository) | The image repository to pull the agent kernel module initContainer image from. | `string` | `"agent-kmodule"` | no |
145-
| <a name="input_kernel_module_image_tag_digest"></a> [kernel\_module\_image\_tag\_digest](#input\_kernel\_module\_image\_tag\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx` | `string` | `"14.2.3@sha256:78c87643d1336efa62f4af8af80290f76097fde51c8d8204a5eb38d73363489d"` | no |
145+
| <a name="input_kernel_module_image_tag_digest"></a> [kernel\_module\_image\_tag\_digest](#input\_kernel\_module\_image\_tag\_digest) | The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx` | `string` | `"14.2.4@sha256:767f60e89821228b5a6a30dc91b343609de511abfaf3647d91bf85dc4968cedd"` | no |
146146
| <a name="input_max_surge"></a> [max\_surge](#input\_max\_surge) | The number of pods that can be created above the desired amount of daemonset pods during an update. If `max_surge` is set to null, the `max_surge` setting is ignored. The variable accepts absolute number or percentage value(e.g., '1' or '10%'). | `string` | `null` | no |
147147
| <a name="input_max_unavailable"></a> [max\_unavailable](#input\_max\_unavailable) | The maximum number of pods that can be unavailable during a DaemonSet rolling update. Accepts absolute number or percentage (e.g., '1' or '10%'). | `string` | `"1"` | no |
148148
| <a name="input_metrics_filter"></a> [metrics\_filter](#input\_metrics\_filter) | To filter custom metrics you can specify which metrics to include and exclude. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_kube_agent#change_kube_agent_inc_exc_metrics | <pre>list(object({<br/> include = optional(string)<br/> exclude = optional(string)<br/> }))</pre> | `[]` | no |

common-dev-assets

examples/obs-agent-iks/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ resource "time_sleep" "wait_operators" {
108108

109109
module "cloud_monitoring" {
110110
source = "terraform-ibm-modules/cloud-monitoring/ibm"
111-
version = "1.10.8"
111+
version = "1.11.0"
112112
instance_name = "${var.prefix}-cloud-monitoring"
113113
resource_group_id = module.resource_group.resource_group_id
114114
resource_tags = var.resource_tags
@@ -122,7 +122,7 @@ module "cloud_monitoring" {
122122

123123
module "scc_wp" {
124124
source = "terraform-ibm-modules/scc-workload-protection/ibm"
125-
version = "1.16.1"
125+
version = "1.16.3"
126126
name = "${var.prefix}-scc-wp"
127127
resource_group_id = module.resource_group.resource_group_id
128128
region = var.region

examples/obs-agent-ocp/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ locals {
7171

7272
module "ocp_base" {
7373
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
74-
version = "3.71.3"
74+
version = "3.73.2"
7575
resource_group_id = module.resource_group.resource_group_id
7676
region = var.region
7777
tags = var.resource_tags
@@ -95,7 +95,7 @@ data "ibm_container_cluster_config" "cluster_config" {
9595

9696
module "cloud_monitoring" {
9797
source = "terraform-ibm-modules/cloud-monitoring/ibm"
98-
version = "1.10.8"
98+
version = "1.11.0"
9999
instance_name = "${var.prefix}-cloud-monitoring"
100100
resource_group_id = module.resource_group.resource_group_id
101101
resource_tags = var.resource_tags
@@ -109,7 +109,7 @@ module "cloud_monitoring" {
109109

110110
module "scc_wp" {
111111
source = "terraform-ibm-modules/scc-workload-protection/ibm"
112-
version = "1.16.1"
112+
version = "1.16.3"
113113
name = "${var.prefix}-scc-wp"
114114
resource_group_id = module.resource_group.resource_group_id
115115
region = var.region

solutions/fully-configurable/variables.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ variable "chart_version" {
186186
description = "The version of the agent helm chart to deploy."
187187
type = string
188188
# This version is automatically managed by renovate automation - do not remove the registryUrl comment on next line
189-
default = "1.96.0" # registryUrl: charts.sysdig.com
189+
default = "1.96.4" # registryUrl: charts.sysdig.com
190190
nullable = false
191191
}
192192

@@ -215,15 +215,15 @@ variable "agent_image_tag_digest" {
215215
description = "The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`."
216216
type = string
217217
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
218-
default = "14.2.3@sha256:cb2c437afde546554e04dbc018c125c6ffb60a9878ce6b45a29d769d91782c4b" # datasource: icr.io/ext/sysdig/agent-slim
218+
default = "14.2.4@sha256:c8e6924999390de58471c2ac82b211a0207a50047a1bd15654a678f2b3d1e26e" # datasource: icr.io/ext/sysdig/agent-slim
219219
nullable = false
220220
}
221221

222222
variable "kernel_module_image_tag_digest" {
223223
description = "The image digest to use for the agent kernel module used by the initContainer. Must be in the format of `X.Y.Z@sha256:xxxxx`"
224224
type = string
225225
# This version is automatically managed by renovate automation - do not remove the datasource comment on next line
226-
default = "14.2.3@sha256:78c87643d1336efa62f4af8af80290f76097fde51c8d8204a5eb38d73363489d" # datasource: icr.io/ext/sysdig/agent-kmodule
226+
default = "14.2.4@sha256:767f60e89821228b5a6a30dc91b343609de511abfaf3647d91bf85dc4968cedd" # datasource: icr.io/ext/sysdig/agent-kmodule
227227
nullable = false
228228
}
229229

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ terraform {
1010
}
1111
helm = {
1212
source = "hashicorp/helm"
13-
version = "3.1.0"
13+
version = "3.1.1"
1414
}
1515
kubernetes = {
1616
source = "hashicorp/kubernetes"

tests/go.mod

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ go 1.24.0
55
toolchain go1.25.4
66

77
require (
8-
github.com/gruntwork-io/terratest v0.52.0
8+
github.com/gruntwork-io/terratest v0.54.0
99
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.22
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.31
1111
)
1212

1313
require (
@@ -90,13 +90,13 @@ require (
9090
go.opentelemetry.io/otel/metric v1.35.0 // indirect
9191
go.opentelemetry.io/otel/trace v1.35.0 // indirect
9292
go.yaml.in/yaml/v2 v2.4.2 // indirect
93-
golang.org/x/crypto v0.43.0 // indirect
94-
golang.org/x/mod v0.28.0 // indirect
95-
golang.org/x/net v0.46.0 // indirect
93+
golang.org/x/crypto v0.45.0 // indirect
94+
golang.org/x/mod v0.29.0 // indirect
95+
golang.org/x/net v0.47.0 // indirect
9696
golang.org/x/sync v0.18.0 // indirect
97-
golang.org/x/sys v0.37.0 // indirect
98-
golang.org/x/text v0.30.0 // indirect
99-
golang.org/x/tools v0.37.0 // indirect
97+
golang.org/x/sys v0.38.0 // indirect
98+
golang.org/x/text v0.31.0 // indirect
99+
golang.org/x/tools v0.38.0 // indirect
100100
gopkg.in/warnings.v0 v0.1.2 // indirect
101101
gopkg.in/yaml.v2 v2.4.0 // indirect
102102
gopkg.in/yaml.v3 v3.0.1 // indirect

0 commit comments

Comments
 (0)