Skip to content

Commit abbafe1

Browse files
authored
feat: add new outputs to the DA stack (#52)
1 parent 6d03df3 commit abbafe1

File tree

2 files changed

+71
-6
lines changed

2 files changed

+71
-6
lines changed

ibm_catalog.json

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -243,6 +243,40 @@
243243
"required": false
244244
}
245245
],
246+
"outputs": [
247+
{
248+
"key": "key_management_service_instance_crn",
249+
"description": "The CRN of the Hyper Protect Crypto Service instance or Key Protect instance."
250+
},
251+
{
252+
"key": "secrets_manager_crn",
253+
"description": "The CRN of the Secrets Manager instance."
254+
},
255+
{
256+
"key": "scc_crn",
257+
"description": "The CRN of the Security and Compliance Center instance."
258+
},
259+
{
260+
"key": "monitoring_crn",
261+
"description": "The crn of the IBM Cloud Monitoring instance."
262+
},
263+
{
264+
"key": "cos_instance_crn",
265+
"description": "The crn of the Cloud Object Storage instance."
266+
},
267+
{
268+
"key": "en_crn",
269+
"description": "The crn of the Event Notifications instance."
270+
},
271+
{
272+
"key": "log_analysis_crn",
273+
"description": "The id of the provisioned Log Analysis instance."
274+
},
275+
{
276+
"key": "scc_workload_protection_crn",
277+
"description": "SCC Workload Protection instance CRN."
278+
}
279+
],
246280
"install_type": "fullstack"
247281
}
248282
]

stack_definition.json

Lines changed: 37 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -230,11 +230,7 @@
230230
},
231231
{
232232
"name": "skip_cos_kms_auth_policy",
233-
"value": "true"
234-
},
235-
{
236-
"name": "existing_en_crn",
237-
"value": "ref:../../members/3 - Event Notifications/outputs/crn"
233+
"value": true
238234
},
239235
{
240236
"name": "scc_service_plan",
@@ -290,5 +286,40 @@
290286
"name": "4b - Secrets Manager",
291287
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.506429ee-7013-4070-aa27-9e8ce8aa6b78-global"
292288
}
293-
]
289+
],
290+
"outputs": [
291+
{
292+
"name": "key_management_service_instance_crn",
293+
"value": "ref:../../members/1 - Key management/outputs/kms_instance_crn"
294+
},
295+
{
296+
"name": "secrets_manager_crn",
297+
"value": "ref:../../members/4b - Secrets Manager/outputs/secrets_manager_crn"
298+
},
299+
{
300+
"name": "scc_crn",
301+
"value": "ref:../../members/4a - Security and Compliance Center/outputs/scc_crn"
302+
},
303+
{
304+
"name": "monitoring_crn",
305+
"value": "ref:../../members/2 - Observability/outputs/cloud_monitoring_crn"
306+
},
307+
{
308+
"name": "cos_instance_crn",
309+
"value": "ref:../../members/2 - Observability/outputs/cos_instance_crn"
310+
},
311+
{
312+
"name": "en_crn",
313+
"value": "ref:../../members/3 - Event Notifications/outputs/crn"
314+
},
315+
{
316+
"name": "log_analysis_crn",
317+
"value": "ref:../../members/2 - Observability/outputs/log_analysis_crn"
318+
},
319+
{
320+
"name": "scc_workload_protection_crn",
321+
"value": "ref:../../members/4a - Security and Compliance Center/outputs/crn"
322+
}
323+
]
324+
294325
}

0 commit comments

Comments
 (0)