You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Landing zone for containerized applications with OpenShift example
This example provides a terraform implementation of the secure landing zone architecture - a production-grade Red Hat OpenShift platform on IBM Cloud VPC by providing a fully integrated ecosystem. Rather than just provisioning compute resources, it orchestrates the critical operational glue required for enterprise workloads—automatically wiring together Key Management, Secrets Manager, Cloud Logs, Cloud Monitoring, Cloud Object Storage and Events Notification. This comprehensive approach reduces operational overhead and eliminates manual configuration errors, ensuring your environment is secure, observable, and ready.
Secure, Compliant, and Scalable Designed to support a wide range of business needs, the architecture is secure by design and fully configurable. It incorporates robust compliance features, such as SCC Workload Protection, while allowing you to tailor specific integrations and worker pools to your requirements. This flexibility enables organizations to standardize on a single, reliable architectural pattern that streamlines security approvals and scales effortlessly with business demand.
Reference Architecture
Components
The primary goal of this example is to provision an OpenShift cluster on VPC and automatically configure the necessary supporting services, including:
VPC Infrastructure: The base VPC, subnets, and network access controls (ACLs) for the OpenShift cluster. Learn more about the service module.
Key Management (KMS): Optional provision and configuration of an IBM Key Protect or Hyper Protect Crypto Services (HPCS) instance for encrypting cluster and boot volumes. Learn more about the service module.
Secrets Management: Optional provision and configuration of an IBM Secrets Manager instance to securely store service credentials and other secrets. Learn more about the service module.
Cloud Object Storage (COS): Optional provision and configuration of COS instances and buckets for flow logs, activity tracker, and other data storage needs. Learn more about the service module.
Monitoring & Logging: Optional provision and configuration of IBM Cloud Monitoring and IBM Cloud Logs instances for centralized observability. Learn more about the Cloud Monitoring and Cloud Logs service module.
Activity Tracker and Event Routing: Configure event routing for platform audit logs to a COS bucket or IBM Cloud Logs. Learn more about the service module.
Security & Compliance: Optional integration with IBM Cloud Security and Compliance Center (SCC) Workload Protection. Learn more about the service module.
VPE Gateways: Optional configuration of Virtual Private Endpoint (VPE) gateways for secure private connectivity to cloud services. Learn more about the service module.
Event Notifications: Optional provision and configuration of IBM Cloud Event Notifications for centralized event routing and management, with support for KMS encryption and failed event collection in COS. Learn more about the service module.
App Configuration: Optional provision and configuration of IBM Cloud App Configuration for centralized feature flag and property management, securely integrated with KMS and Event Notifications. Learn more about the service module.
Context-Based Restrictions (CBR): Optional support for defining and attaching network access rules (CBR zones and rules) to all supported services (KMS, COS, Secrets Manager) to enforce zero-trust networking. Learn more about the service module.