diff --git a/README.md b/README.md
index fd26b18..4535447 100644
--- a/README.md
+++ b/README.md
@@ -105,7 +105,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
| [api\_vpce\_security\_group\_ids](#input\_api\_vpce\_security\_group\_ids) | IDs of security groups to attach to API endpoint | `list(string)` | `[]` | no |
| [api\_vpce\_subnet\_ids](#input\_api\_vpce\_subnet\_ids) | IDs of subnets to associate with API endpoint | `list(string)` | `[]` | no |
| [api\_vpce\_tags](#input\_api\_vpce\_tags) | A map of tags to apply to the API endpoint | `map(string)` | `{}` | no |
-| [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `false` | no |
+| [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `true` | no |
| [bucket\_name](#input\_bucket\_name) | Lambda artifact S3 bucket name | `string` | `""` | no |
| [create\_agent\_vpce](#input\_create\_agent\_vpce) | Controls whether an agent endpoint should be created | `bool` | `false` | no |
| [create\_api\_vpce](#input\_create\_api\_vpce) | Controls whether a API endpoint should be created | `bool` | `false` | no |
diff --git a/examples/complete/README.md b/examples/complete/README.md
index b2cd545..9d4e320 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -38,11 +38,11 @@ Note that this example may create resources which will incur monetary charges on
| Name | Source | Version |
|------|--------|---------|
| [default](#module\_default) | ../../ | n/a |
-| [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2 |
-| [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2 |
-| [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4 |
-| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3 |
-| [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.2 |
+| [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 |
+| [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 |
+| [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4.0 |
+| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 |
+| [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.0 |
## Resources
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index b7d02ef..05ee3c0 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -65,7 +65,7 @@ resource "aws_kms_alias" "datadog" {
module "vpc" {
source = "terraform-aws-modules/vpc/aws"
- version = "~> 3"
+ version = "~> 3.0"
name = local.name
cidr = "10.0.0.0/16"
@@ -98,7 +98,7 @@ module "vpc" {
module "vpc_endpoints" {
source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints"
- version = "~> 3.2"
+ version = "~> 3.0"
vpc_id = module.vpc.vpc_id
security_group_ids = [module.security_group.security_group_id]
@@ -119,7 +119,7 @@ module "vpc_endpoints" {
module "security_group" {
source = "terraform-aws-modules/security-group/aws"
- version = "~> 4"
+ version = "~> 4.0"
name = local.name
description = "Example security group"
@@ -150,7 +150,7 @@ module "security_group" {
module "log_bucket_1" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "~> 2"
+ version = "~> 2.0"
bucket = "logs-1-${random_pet.this.id}"
force_destroy = true
@@ -177,7 +177,7 @@ module "log_bucket_1" {
module "log_bucket_2" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "~> 2"
+ version = "~> 2.0"
bucket = "logs-2-${random_pet.this.id}"
force_destroy = true
diff --git a/modules/log_forwarder/README.md b/modules/log_forwarder/README.md
index bef4562..08bd365 100644
--- a/modules/log_forwarder/README.md
+++ b/modules/log_forwarder/README.md
@@ -55,7 +55,7 @@ module "datadog_log_forwarder" {
| Name | Source | Version |
|------|--------|---------|
-| [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.6.0 |
+| [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.10.0 |
## Resources
diff --git a/modules/log_forwarder/main.tf b/modules/log_forwarder/main.tf
index f23edda..43fc9e9 100644
--- a/modules/log_forwarder/main.tf
+++ b/modules/log_forwarder/main.tf
@@ -24,7 +24,7 @@ data "aws_region" "current" {}
module "this_s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "v2.6.0"
+ version = "v2.10.0"
create_bucket = var.create && var.create_bucket
bucket = local.bucket_name
diff --git a/variables.tf b/variables.tf
index 6b87203..0a645ab 100644
--- a/variables.tf
+++ b/variables.tf
@@ -50,7 +50,7 @@ variable "bucket_name" {
variable "bucket_attach_deny_insecure_transport_policy" {
description = "Controls if S3 bucket should have deny non-SSL transport policy attacheds"
type = bool
- default = false
+ default = true
}
# Log Forwarder S3 Objcet