diff --git a/README.md b/README.md
index 485e114..9f33f03 100644
--- a/README.md
+++ b/README.md
@@ -291,7 +291,8 @@ for example.
| [cloudwatch\_log\_group](#output\_cloudwatch\_log\_group) | Name of the CloudWatch log group for container logs. |
| [container\_definitions](#output\_container\_definitions) | Container definitions used by this service including all sidecars. |
| [ecr\_repository\_arn](#output\_ecr\_repository\_arn) | Full ARN of the ECR repository. |
-| [ecr\_repository\_url](#output\_ecr\_repository\_url) | URL of the ECR repository. |
+| [ecr\_repository\_id](#output\_ecr\_repository\_id) | The registry ID where the repository was created. |
+| [ecr\_repository\_url](#output\_ecr\_repository\_url) | The URL of the repository (in the form `aws_account_id.dkr.ecr.region.amazonaws.com/repositoryName`) |
| [task\_execution\_role\_arn](#output\_task\_execution\_role\_arn) | ARN of the task execution role that the Amazon ECS container agent and the Docker daemon can assume. |
| [task\_execution\_role\_name](#output\_task\_execution\_role\_name) | Friendly name of the task execution role that the Amazon ECS container agent and the Docker daemon can assume. |
| [task\_execution\_role\_unique\_id](#output\_task\_execution\_role\_unique\_id) | Stable and unique string identifying the IAM role that the Amazon ECS container agent and the Docker daemon can assume. |
diff --git a/examples/complete/README.md b/examples/complete/README.md
index 787b5f0..e004ebd 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -34,22 +34,20 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Source | Version |
|------|--------|---------|
-| [alb\_security\_group\_public](#module\_alb\_security\_group\_public) | registry.terraform.io/terraform-aws-modules/security-group/aws | >= 4.17 |
+| [alb](#module\_alb) | terraform-aws-modules/alb/aws | ~> 9.0 |
| [service](#module\_service) | ../../ | n/a |
-| [vpc](#module\_vpc) | registry.terraform.io/terraform-aws-modules/vpc/aws | >= 4.0 |
-| [vpc\_endpoints](#module\_vpc\_endpoints) | registry.terraform.io/terraform-aws-modules/vpc/aws//modules/vpc-endpoints | >= 4.0 |
+| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
## Resources
| Name | Type |
|------|------|
| [aws_ecs_cluster.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster) | resource |
-| [aws_lb.public](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb) | resource |
-| [aws_lb_listener.http](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb_listener) | resource |
+| [aws_security_group.egress_all](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group) | resource |
| [null_resource.initial_image](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource |
| [random_pet.this](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) | resource |
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source |
-| [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
+| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
## Inputs
diff --git a/examples/complete/data.tf b/examples/complete/data.tf
index e275acc..edba410 100644
--- a/examples/complete/data.tf
+++ b/examples/complete/data.tf
@@ -3,8 +3,3 @@ data "aws_caller_identity" "current" {}
data "aws_availability_zones" "available" {
state = "available"
}
-
-data "aws_security_group" "default" {
- name = "default"
- vpc_id = module.vpc.vpc_id
-}