diff --git a/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md b/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md index 1bfa0b5..5900e38 100644 --- a/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md +++ b/addons/byo-cloudwatch-log-sharing/target-account-firehose/.header.md @@ -25,7 +25,7 @@ provider "aws" { } module "fleet_log_sharing_target" { - source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1" providers = { aws.destination = aws.source_region diff --git a/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md b/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md index b6982d4..9134b08 100644 --- a/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md +++ b/addons/byo-cloudwatch-log-sharing/target-account-firehose/README.md @@ -25,7 +25,7 @@ provider "aws" { } module "fleet_log_sharing_target" { - source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1" providers = { aws.destination = aws.source_region @@ -71,9 +71,9 @@ Then apply the source account module (`../cloudwatch`) using `module.fleet_log_s | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 5.29.0 | -| [aws.destination](#provider\_aws.destination) | >= 5.29.0 | -| [aws.target](#provider\_aws.target) | >= 5.29.0 | +| [aws](#provider\_aws) | 6.41.0 | +| [aws.destination](#provider\_aws.destination) | 6.41.0 | +| [aws.target](#provider\_aws.target) | 6.41.0 | ## Modules diff --git a/addons/byo-file-carving/target-account/README.md b/addons/byo-file-carving/target-account/README.md index 456dfd0..5760f0a 100644 --- a/addons/byo-file-carving/target-account/README.md +++ b/addons/byo-file-carving/target-account/README.md @@ -32,7 +32,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | n/a | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/byo-firehose-logging-destination/target-account/README.md b/addons/byo-firehose-logging-destination/target-account/README.md index 6175550..a0f9cde 100644 --- a/addons/byo-firehose-logging-destination/target-account/README.md +++ b/addons/byo-firehose-logging-destination/target-account/README.md @@ -13,13 +13,13 @@ If you wanted to make changes to the individual files to fit your environment, f ``` module "firehose_logging" { source = "github.com/fleetdm/fleet-terraform//addons/byo-firehose-logging-destination/target-account" - # Variables osquery_logging_destination_bucket_name = {your-desired-bucket-prefix} fleet_iam_role_arn = {supplied by Fleet} sts_external_id = {if using} } ``` + ## Requirements | Name | Version | @@ -31,7 +31,7 @@ module "firehose_logging" { | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 5.29.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules @@ -64,9 +64,9 @@ No modules. | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| -| [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | the arn of the fleet role that firehose will assume to write data to your bucket | `string` | n/a | yes | +| [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | The ARN of the IAM role that will be assumed to gain permissions required to write to the Kinesis Firehose delivery stream. | `string` | n/a | yes | | [kms\_key\_arn](#input\_kms\_key\_arn) | An optional KMS key ARN for server-side encryption. If not provided and encryption is enabled, a new key will be created. | `string` | `""` | no | -| [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. |
map(object({
name = string
prefix = string
error_output_prefix = string
buffering_size = number
buffering_interval = number
compression_format = string
}))
|
{
"audit": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "fleet_audit",
"prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"results": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_results",
"prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"status": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_status",
"prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
}
}
| no | +| [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. |
map(object({
name = string
prefix = string
error_output_prefix = string
buffering_size = number
buffering_interval = number
compression_format = string
}))
|
{
"audit": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "fleet_audit",
"prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"results": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_results",
"prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
},
"status": {
"buffering_interval": 120,
"buffering_size": 20,
"compression_format": "UNCOMPRESSED",
"error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",
"name": "osquery_status",
"prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"
}
}
| no | | [osquery\_logging\_destination\_bucket\_name](#input\_osquery\_logging\_destination\_bucket\_name) | name of the bucket to store osquery results & status logs | `string` | n/a | yes | | [server\_side\_encryption\_enabled](#input\_server\_side\_encryption\_enabled) | A boolean flag to enable/disable server-side encryption. Defaults to true (enabled). | `bool` | `true` | no | | [sts\_external\_id](#input\_sts\_external\_id) | Optional unique identifier that can be used by the principal assuming the role to assert its identity. | `string` | `""` | no | diff --git a/addons/logging-destination-datadog/.header.md b/addons/logging-destination-datadog/.header.md index 7df1899..b40d1ad 100644 --- a/addons/logging-destination-datadog/.header.md +++ b/addons/logging-destination-datadog/.header.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad ```hcl module "datadog-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2" datadog_api_key = "your-datadog-api-key" @@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { diff --git a/addons/logging-destination-datadog/README.md b/addons/logging-destination-datadog/README.md index 1b8c423..3f31eaa 100644 --- a/addons/logging-destination-datadog/README.md +++ b/addons/logging-destination-datadog/README.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad ```hcl module "datadog-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2" datadog_api_key = "your-datadog-api-key" @@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { @@ -121,7 +121,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.24.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/logging-destination-firehose/README.md b/addons/logging-destination-firehose/README.md index dfb94bb..ddaae7c 100644 --- a/addons/logging-destination-firehose/README.md +++ b/addons/logging-destination-firehose/README.md @@ -9,7 +9,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.24.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/logging-destination-snowflake/.header.md b/addons/logging-destination-snowflake/.header.md index 4332720..ddad444 100644 --- a/addons/logging-destination-snowflake/.header.md +++ b/addons/logging-destination-snowflake/.header.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf ```hcl module "snowflake-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3" s3_bucket_config = { name_prefix = "fleet-snowflake-failure" @@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { diff --git a/addons/logging-destination-snowflake/README.md b/addons/logging-destination-snowflake/README.md index efb9d88..f25d334 100644 --- a/addons/logging-destination-snowflake/README.md +++ b/addons/logging-destination-snowflake/README.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf ```hcl module "snowflake-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3" s3_bucket_config = { name_prefix = "fleet-snowflake-failure" @@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { @@ -117,7 +117,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.24.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/logging-destination-splunk/.header.md b/addons/logging-destination-splunk/.header.md index 22faea6..7efc275 100644 --- a/addons/logging-destination-splunk/.header.md +++ b/addons/logging-destination-splunk/.header.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun ```hcl module "splunk-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1" s3_bucket_config = { name_prefix = "fleet-splunk-failure" @@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { diff --git a/addons/logging-destination-splunk/README.md b/addons/logging-destination-splunk/README.md index b26588e..eeb5b5d 100644 --- a/addons/logging-destination-splunk/README.md +++ b/addons/logging-destination-splunk/README.md @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun ```hcl module "splunk-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1" s3_bucket_config = { name_prefix = "fleet-splunk-failure" @@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration: ```hcl module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { @@ -97,7 +97,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.25.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/okta-conditional-access/.header.md b/addons/okta-conditional-access/.header.md index c3d2669..5e88f76 100644 --- a/addons/okta-conditional-access/.header.md +++ b/addons/okta-conditional-access/.header.md @@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" { } module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" ... fleet_config = { ... @@ -86,7 +86,7 @@ module "fleet" { } module "okta-conditional-access" { - source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0" + source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1" customer_prefix = "fleet" vpc_id = module.fleet.vpc.vpc_id trust_store_s3_config = { diff --git a/addons/okta-conditional-access/README.md b/addons/okta-conditional-access/README.md index b607345..4caafe0 100644 --- a/addons/okta-conditional-access/README.md +++ b/addons/okta-conditional-access/README.md @@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" { } module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" ... fleet_config = { ... @@ -86,7 +86,7 @@ module "fleet" { } module "okta-conditional-access" { - source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0" + source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1" customer_prefix = "fleet" vpc_id = module.fleet.vpc.vpc_id trust_store_s3_config = { @@ -126,7 +126,7 @@ No requirements. | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.28.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/addons/osquery-carve/README.md b/addons/osquery-carve/README.md index 6378b80..8627caf 100644 --- a/addons/osquery-carve/README.md +++ b/addons/osquery-carve/README.md @@ -25,7 +25,7 @@ When bringing your own KMS key, it is your responsibility to ensure that key pol | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.39.0 | +| [aws](#provider\_aws) | 6.41.0 | ## Modules diff --git a/byo-vpc/example/README.md b/byo-vpc/example/README.md index e7101ab..cb08e41 100644 --- a/byo-vpc/example/README.md +++ b/byo-vpc/example/README.md @@ -2,14 +2,14 @@ | Name | Version | |------|---------| -| [terraform](#requirement\_terraform) | >= 1.3.8 | -| [aws](#requirement\_aws) | 6.11.0 | +| [terraform](#requirement\_terraform) | >= 1.5.0 | +| [aws](#requirement\_aws) | >= 6.11.0 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.11.0 | +| [aws](#provider\_aws) | 6.41.0 | | [random](#provider\_random) | 3.8.1 | ## Modules @@ -17,18 +17,18 @@ | Name | Source | Version | |------|--------|---------| | [acm](#module\_acm) | terraform-aws-modules/acm/aws | 4.3.1 | -| [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.22.1 | n/a | -| [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1 | n/a | -| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1 | n/a | +| [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1 | n/a | +| [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6 | n/a | +| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2 | n/a | | [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | 5.1.2 | ## Resources | Name | Type | |------|------| -| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/resources/route53_record) | resource | +| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource | | [random_pet.main](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) | resource | -| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/data-sources/route53_zone) | data source | +| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source | ## Inputs diff --git a/byo-vpc/example/main.tf b/byo-vpc/example/main.tf index c98544e..2c66e0f 100644 --- a/byo-vpc/example/main.tf +++ b/byo-vpc/example/main.tf @@ -51,7 +51,7 @@ data "aws_route53_zone" "main" { } module "firehose-logging" { - source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1" + source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6" osquery_results_s3_bucket = { name = "${random_pet.main.id}-results" } @@ -92,7 +92,7 @@ module "vpc" { } module "byo-vpc" { - source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.0" + source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1" vpc_config = { vpc_id = module.vpc.vpc_id networking = { @@ -167,7 +167,7 @@ module "byo-vpc" { } module "migrations" { - source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1" + source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2" ecs_cluster = module.byo-vpc.byo-db.byo-ecs.service.cluster task_definition = module.byo-vpc.byo-db.byo-ecs.task_definition.family task_definition_revision = module.byo-vpc.byo-db.byo-ecs.task_definition.revision @@ -176,4 +176,5 @@ module "migrations" { ecs_service = module.byo-vpc.byo-db.byo-ecs.service.name desired_count = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity min_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity + max_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.max_capacity } diff --git a/example/README.md b/example/README.md index 7dfbebf..ab77516 100644 --- a/example/README.md +++ b/example/README.md @@ -25,7 +25,7 @@ If using a new route53 zone: | Name | Version | |------|---------| -| [aws](#provider\_aws) | 6.39.0 | +| [aws](#provider\_aws) | 6.40.0 | | [random](#provider\_random) | 3.8.1 | | [tls](#provider\_tls) | 4.2.1 | @@ -34,9 +34,9 @@ If using a new route53 zone: | Name | Source | Version | |------|--------|---------| | [acm](#module\_acm) | terraform-aws-modules/acm/aws | 4.3.1 | -| [fleet](#module\_fleet) | github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.0 | n/a | +| [fleet](#module\_fleet) | github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1 | n/a | | [mdm](#module\_mdm) | github.com/fleetdm/fleet-terraform/addons/mdm?depth=1&ref=tf-mod-addon-mdm-v2.2.0 | n/a | -| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.0 | n/a | +| [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2 | n/a | ## Resources diff --git a/example/main.tf b/example/main.tf index 1a41071..a8b8b8c 100644 --- a/example/main.tf +++ b/example/main.tf @@ -75,7 +75,7 @@ locals { } module "fleet" { - source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.0" + source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1" certificate_arn = module.acm.acm_certificate_arn vpc = { @@ -277,7 +277,7 @@ module "fleet" { # doesn't directly support all the features required. the aws cli is invoked via a null-resource. module "migrations" { - source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.0" + source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2" ecs_cluster = module.fleet.byo-vpc.byo-db.byo-ecs.service.cluster task_definition = module.fleet.byo-vpc.byo-db.byo-ecs.task_definition.family task_definition_revision = module.fleet.byo-vpc.byo-db.byo-ecs.task_definition.revision @@ -295,7 +295,7 @@ module "migrations" { # Enable if using s3 for carves # module "osquery-carve" { -# source = "github.com/fleetdm/fleet-terraform/addons/osquery-carve?depth=1&ref=tf-mod-addon-osquery-carve-v1.3.0" +# source = "github.com/fleetdm/fleet-terraform/addons/osquery-carve?depth=1&ref=tf-mod-addon-osquery-carve-v1.3.1" # osquery_carve_s3_bucket = { # name = local.osquery_carve_bucket_name # } @@ -303,7 +303,7 @@ module "migrations" { # Uncomment if using firehose logging destination # module "firehose-logging" { -# source = "github.com/fleetdm/fleet-terraform/addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.5" +# source = "github.com/fleetdm/fleet-terraform/addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6" # osquery_results_s3_bucket = { # name = local.osquery_results_bucket_name # }