diff --git a/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md b/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md index 1bfa0b5..5900e38 100644 --- a/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md +++ b/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md @@ -25,7 +25,7 @@ provider "aws" { } module "fleet_log_sharing_target" { - source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1" providers = { aws.destination = aws.source_region diff --git a/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md b/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md index b6982d4..9134b08 100644 --- a/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md +++ b/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md @@ -25,7 +25,7 @@ provider "aws" { } module "fleet_log_sharing_target" { - source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1" providers = { aws.destination = aws.source_region @@ -71,9 +71,9 @@ Then apply the source account module (`../cloudwatch`) using `module.fleet_log_s | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 5.29.0 | -| [aws.destination](#provider\_aws.destination) | >= 5.29.0 | -| [aws.target](#provider\_aws.target) | >= 5.29.0 | +| [aws](#provider\_aws) | 6.41.0 | +| [aws.destination](#provider\_aws.destination) | 6.41.0 | +| [aws.target](#provider\_aws.target) | 6.41.0 | ## Modules diff --git a/addons/byo-file-carving/target-account/README.md b/addons/byo-file-carving/target-account/README.md index 456dfd0..5760f0a 100644 --- a/addons/byo-file-carving/target-account/README.md +++ b/addons/byo-file-carving/target-account/README.md @@ -32,7 +32,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | n/a | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/byo-firehose-logging-destination/target-account/README.md b/addons/byo-firehose-logging-destination/target-account/README.md index 6175550..a0f9cde 100644 --- a/addons/byo-firehose-logging-destination/target-account/README.md +++ b/addons/byo-firehose-logging-destination/target-account/README.md @@ -13,13 +13,13 @@ If you wanted to make changes to the individual files to fit your environment, f ``` module "firehose_logging" { source = "github.com/fleetdm/fleet-terraform//addons/byo-firehose-logging-destination/target-account" - # Variables osquery_logging_destination_bucket_name = {your-desired-bucket-prefix} fleet_iam_role_arn = {supplied by Fleet} sts_external_id = {if using} } ``` + ## Requirements | Name | Version | @@ -31,7 +31,7 @@ module "firehose_logging" { | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 5.29.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules @@ -64,9 +64,9 @@ No modules. | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| -| [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | the arn of the fleet role that firehose will assume to write data to your bucket | `string` | n/a | yes | +| [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | The ARN of the IAM role that will be assumed to gain permissions required to write to the Kinesis Firehose delivery stream. | `string` | n/a | yes | | [kms\_key\_arn](#input\_kms\_key\_arn) | An optional KMS key ARN for server-side encryption. If not provided and encryption is enabled, a new key will be created. | `string` | `""` | no | -| [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. |
map(object({
name = string
prefix = string
error_output_prefix = string
buffering_size = number
buffering_interval = number
compression_format = string
})) | {
"audit": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "fleet_audit",
"prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"results": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_results",
"prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"status": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_status",
"prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
}
} | no |
+| [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. | map(object({
name = string
prefix = string
error_output_prefix = string
buffering_size = number
buffering_interval = number
compression_format = string
})) | {
"audit": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "fleet_audit",
"prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"results": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_results",
"prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"status": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_status",
"prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
}
} | no |
| [osquery\_logging\_destination\_bucket\_name](#input\_osquery\_logging\_destination\_bucket\_name) | name of the bucket to store osquery results & status logs | `string` | n/a | yes |
| [server\_side\_encryption\_enabled](#input\_server\_side\_encryption\_enabled) | A boolean flag to enable/disable server-side encryption. Defaults to true (enabled). | `bool` | `true` | no |
| [sts\_external\_id](#input\_sts\_external\_id) | Optional unique identifier that can be used by the principal assuming the role to assert its identity. | `string` | `""` | no |
diff --git a/addons/logging-destination-datadog/.header.md b/addons/logging-destination-datadog/.header.md
index 7df1899..b40d1ad 100644
--- a/addons/logging-destination-datadog/.header.md
+++ b/addons/logging-destination-datadog/.header.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad
```hcl
module "datadog-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2"
datadog_api_key = "your-datadog-api-key"
@@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
diff --git a/addons/logging-destination-datadog/README.md b/addons/logging-destination-datadog/README.md
index 1b8c423..3f31eaa 100644
--- a/addons/logging-destination-datadog/README.md
+++ b/addons/logging-destination-datadog/README.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad
```hcl
module "datadog-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2"
datadog_api_key = "your-datadog-api-key"
@@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
@@ -121,7 +121,7 @@ No requirements.
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.24.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/addons/logging-destination-firehose/README.md b/addons/logging-destination-firehose/README.md
index dfb94bb..ddaae7c 100644
--- a/addons/logging-destination-firehose/README.md
+++ b/addons/logging-destination-firehose/README.md
@@ -9,7 +9,7 @@ No requirements.
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.24.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/addons/logging-destination-snowflake/.header.md b/addons/logging-destination-snowflake/.header.md
index 4332720..ddad444 100644
--- a/addons/logging-destination-snowflake/.header.md
+++ b/addons/logging-destination-snowflake/.header.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf
```hcl
module "snowflake-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3"
s3_bucket_config = {
name_prefix = "fleet-snowflake-failure"
@@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
diff --git a/addons/logging-destination-snowflake/README.md b/addons/logging-destination-snowflake/README.md
index efb9d88..f25d334 100644
--- a/addons/logging-destination-snowflake/README.md
+++ b/addons/logging-destination-snowflake/README.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf
```hcl
module "snowflake-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3"
s3_bucket_config = {
name_prefix = "fleet-snowflake-failure"
@@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
@@ -117,7 +117,7 @@ No requirements.
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.24.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/addons/logging-destination-splunk/.header.md b/addons/logging-destination-splunk/.header.md
index 22faea6..7efc275 100644
--- a/addons/logging-destination-splunk/.header.md
+++ b/addons/logging-destination-splunk/.header.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun
```hcl
module "splunk-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1"
s3_bucket_config = {
name_prefix = "fleet-splunk-failure"
@@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
diff --git a/addons/logging-destination-splunk/README.md b/addons/logging-destination-splunk/README.md
index b26588e..eeb5b5d 100644
--- a/addons/logging-destination-splunk/README.md
+++ b/addons/logging-destination-splunk/README.md
@@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun
```hcl
module "splunk-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1"
s3_bucket_config = {
name_prefix = "fleet-splunk-failure"
@@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration:
```hcl
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
@@ -97,7 +97,7 @@ No requirements.
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.25.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/addons/okta-conditional-access/.header.md b/addons/okta-conditional-access/.header.md
index c3d2669..5e88f76 100644
--- a/addons/okta-conditional-access/.header.md
+++ b/addons/okta-conditional-access/.header.md
@@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" {
}
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
...
fleet_config = {
...
@@ -86,7 +86,7 @@ module "fleet" {
}
module "okta-conditional-access" {
- source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0"
+ source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1"
customer_prefix = "fleet"
vpc_id = module.fleet.vpc.vpc_id
trust_store_s3_config = {
diff --git a/addons/okta-conditional-access/README.md b/addons/okta-conditional-access/README.md
index b607345..4caafe0 100644
--- a/addons/okta-conditional-access/README.md
+++ b/addons/okta-conditional-access/README.md
@@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" {
}
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
...
fleet_config = {
...
@@ -86,7 +86,7 @@ module "fleet" {
}
module "okta-conditional-access" {
- source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0"
+ source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1"
customer_prefix = "fleet"
vpc_id = module.fleet.vpc.vpc_id
trust_store_s3_config = {
@@ -126,7 +126,7 @@ No requirements.
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.28.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/addons/osquery-carve/README.md b/addons/osquery-carve/README.md
index 6378b80..8627caf 100644
--- a/addons/osquery-carve/README.md
+++ b/addons/osquery-carve/README.md
@@ -25,7 +25,7 @@ When bringing your own KMS key, it is your responsibility to ensure that key pol
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.39.0 |
+| [aws](#provider\_aws) | 6.41.0 |
## Modules
diff --git a/byo-vpc/example/README.md b/byo-vpc/example/README.md
index e7101ab..cb08e41 100644
--- a/byo-vpc/example/README.md
+++ b/byo-vpc/example/README.md
@@ -2,14 +2,14 @@
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.3.8 |
-| [aws](#requirement\_aws) | 6.11.0 |
+| [terraform](#requirement\_terraform) | >= 1.5.0 |
+| [aws](#requirement\_aws) | >= 6.11.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.11.0 |
+| [aws](#provider\_aws) | 6.41.0 |
| [random](#provider\_random) | 3.8.1 |
## Modules
@@ -17,18 +17,18 @@
| Name | Source | Version |
|------|--------|---------|
| [acm](#module\_acm) | terraform-aws-modules/acm/aws | 4.3.1 |
-| [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.22.1 | n/a |
-| [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1 | n/a |
-| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1 | n/a |
+| [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1 | n/a |
+| [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6 | n/a |
+| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2 | n/a |
| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | 5.1.2 |
## Resources
| Name | Type |
|------|------|
-| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/resources/route53_record) | resource |
+| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource |
| [random_pet.main](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) | resource |
-| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/data-sources/route53_zone) | data source |
+| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source |
## Inputs
diff --git a/byo-vpc/example/main.tf b/byo-vpc/example/main.tf
index c98544e..2c66e0f 100644
--- a/byo-vpc/example/main.tf
+++ b/byo-vpc/example/main.tf
@@ -51,7 +51,7 @@ data "aws_route53_zone" "main" {
}
module "firehose-logging" {
- source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1"
+ source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6"
osquery_results_s3_bucket = {
name = "${random_pet.main.id}-results"
}
@@ -92,7 +92,7 @@ module "vpc" {
}
module "byo-vpc" {
- source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.0"
+ source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1"
vpc_config = {
vpc_id = module.vpc.vpc_id
networking = {
@@ -167,7 +167,7 @@ module "byo-vpc" {
}
module "migrations" {
- source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1"
+ source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2"
ecs_cluster = module.byo-vpc.byo-db.byo-ecs.service.cluster
task_definition = module.byo-vpc.byo-db.byo-ecs.task_definition.family
task_definition_revision = module.byo-vpc.byo-db.byo-ecs.task_definition.revision
@@ -176,4 +176,5 @@ module "migrations" {
ecs_service = module.byo-vpc.byo-db.byo-ecs.service.name
desired_count = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity
min_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity
+ max_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.max_capacity
}
diff --git a/example/README.md b/example/README.md
index 7dfbebf..ab77516 100644
--- a/example/README.md
+++ b/example/README.md
@@ -25,7 +25,7 @@ If using a new route53 zone:
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | 6.39.0 |
+| [aws](#provider\_aws) | 6.40.0 |
| [random](#provider\_random) | 3.8.1 |
| [tls](#provider\_tls) | 4.2.1 |
@@ -34,9 +34,9 @@ If using a new route53 zone:
| Name | Source | Version |
|------|--------|---------|
| [acm](#module\_acm) | terraform-aws-modules/acm/aws | 4.3.1 |
-| [fleet](#module\_fleet) | github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.0 | n/a |
+| [fleet](#module\_fleet) | github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1 | n/a |
| [mdm](#module\_mdm) | github.com/fleetdm/fleet-terraform/addons/mdm?depth=1&ref=tf-mod-addon-mdm-v2.2.0 | n/a |
-| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.0 | n/a |
+| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2 | n/a |
## Resources
diff --git a/example/main.tf b/example/main.tf
index 1a41071..a8b8b8c 100644
--- a/example/main.tf
+++ b/example/main.tf
@@ -75,7 +75,7 @@ locals {
}
module "fleet" {
- source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.0"
+ source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn
vpc = {
@@ -277,7 +277,7 @@ module "fleet" {
# doesn't directly support all the features required. the aws cli is invoked via a null-resource.
module "migrations" {
- source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.0"
+ source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2"
ecs_cluster = module.fleet.byo-vpc.byo-db.byo-ecs.service.cluster
task_definition = module.fleet.byo-vpc.byo-db.byo-ecs.task_definition.family
task_definition_revision = module.fleet.byo-vpc.byo-db.byo-ecs.task_definition.revision
@@ -295,7 +295,7 @@ module "migrations" {
# Enable if using s3 for carves
# module "osquery-carve" {
-# source = "github.com/fleetdm/fleet-terraform/addons/osquery-carve?depth=1&ref=tf-mod-addon-osquery-carve-v1.3.0"
+# source = "github.com/fleetdm/fleet-terraform/addons/osquery-carve?depth=1&ref=tf-mod-addon-osquery-carve-v1.3.1"
# osquery_carve_s3_bucket = {
# name = local.osquery_carve_bucket_name
# }
@@ -303,7 +303,7 @@ module "migrations" {
# Uncomment if using firehose logging destination
# module "firehose-logging" {
-# source = "github.com/fleetdm/fleet-terraform/addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.5"
+# source = "github.com/fleetdm/fleet-terraform/addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6"
# osquery_results_s3_bucket = {
# name = local.osquery_results_bucket_name
# }