|
6 | 6 | "type": "string", |
7 | 7 | "hidden": false, |
8 | 8 | "default": "core-security", |
9 | | - "description": "The prefix to use for all resources deployed.", |
10 | 9 | "custom_config": {} |
11 | 10 | }, |
12 | 11 | { |
|
15 | 14 | "type": "string", |
16 | 15 | "hidden": false, |
17 | 16 | "default": "us-south", |
18 | | - "description": "The region to deploy the Deployable Architecture", |
19 | 17 | "custom_config": {} |
20 | 18 | }, |
21 | 19 | { |
|
27 | 25 | "custom_config": {} |
28 | 26 | }, |
29 | 27 | { |
30 | | - "name": "sm_service_plan", |
| 28 | + "name": "enable_platform_logs_metrics", |
31 | 29 | "required": false, |
32 | | - "type": "string", |
| 30 | + "type": "boolean", |
33 | 31 | "hidden": false, |
34 | | - "default": "standard", |
| 32 | + "default": true, |
35 | 33 | "custom_config": {} |
36 | 34 | }, |
37 | 35 | { |
38 | | - "name": "scc_service_plan", |
| 36 | + "name": "en_email_list", |
39 | 37 | "required": false, |
40 | | - "type": "string", |
| 38 | + "type": "array", |
41 | 39 | "hidden": false, |
42 | | - "default": "security-compliance-center-standard-plan", |
| 40 | + "default": [], |
43 | 41 | "custom_config": {} |
44 | 42 | }, |
45 | 43 | { |
|
51 | 49 | "custom_config": {} |
52 | 50 | }, |
53 | 51 | { |
54 | | - "name": "existing_kms_instance_crn", |
| 52 | + "name": "sm_service_plan", |
55 | 53 | "required": false, |
56 | 54 | "type": "string", |
57 | 55 | "hidden": false, |
58 | | - "default": "__NULL__" |
59 | | - }, |
60 | | - { |
61 | | - "name": "enable_platform_logs_metrics", |
62 | | - "required": false, |
63 | | - "type": "boolean", |
64 | | - "hidden": false, |
65 | | - "default": true, |
| 56 | + "default": "standard", |
66 | 57 | "custom_config": {} |
67 | 58 | }, |
68 | 59 | { |
69 | | - "name": "en_email_list", |
| 60 | + "name": "scc_service_plan", |
70 | 61 | "required": false, |
71 | | - "type": "array", |
| 62 | + "type": "string", |
72 | 63 | "hidden": false, |
73 | | - "default": [], |
| 64 | + "default": "security-compliance-center-standard-plan", |
74 | 65 | "custom_config": {} |
75 | 66 | } |
76 | 67 | ], |
|
134 | 125 | "value": "ref:../../inputs/region" |
135 | 126 | }, |
136 | 127 | { |
137 | | - "name": "existing_kms_instance_crn", |
138 | | - "value": "ref:../../members/1a - Key management/outputs/kms_instance_crn" |
| 128 | + "name": "prefix", |
| 129 | + "value": "ref:../../inputs/prefix" |
139 | 130 | }, |
140 | 131 | { |
141 | | - "name": "existing_cos_instance_crn", |
142 | | - "value": "ref:../../members/1b - Object storage/outputs/cos_instance_id" |
| 132 | + "name": "existing_kms_instance_crn", |
| 133 | + "value": "ref:../../members/1a - Key management/outputs/kms_instance_crn" |
143 | 134 | }, |
144 | 135 | { |
145 | 136 | "name": "kms_endpoint_type", |
146 | 137 | "value": "private" |
147 | 138 | }, |
148 | 139 | { |
149 | | - "name": "prefix", |
150 | | - "value": "ref:../../inputs/prefix" |
| 140 | + "name": "existing_cos_instance_crn", |
| 141 | + "value": "ref:../../members/1b - Object storage/outputs/cos_instance_id" |
151 | 142 | }, |
152 | 143 | { |
153 | 144 | "name": "enable_platform_logs", |
|
229 | 220 | "name": "existing_kms_instance_crn", |
230 | 221 | "value": "ref:../../members/1a - Key management/outputs/kms_instance_crn" |
231 | 222 | }, |
| 223 | + { |
| 224 | + "name": "kms_endpoint_type", |
| 225 | + "value": "private" |
| 226 | + }, |
232 | 227 | { |
233 | 228 | "name": "existing_monitoring_crn", |
234 | 229 | "value": "ref:../../members/2 - Observability/outputs/cloud_monitoring_crn" |
|
237 | 232 | "name": "existing_cos_instance_crn", |
238 | 233 | "value": "ref:../../members/1b - Object storage/outputs/cos_instance_id" |
239 | 234 | }, |
240 | | - { |
241 | | - "name": "existing_en_crn", |
242 | | - "value": "ref:../../members/3 - Event Notifications/outputs/crn" |
243 | | - }, |
244 | | - { |
245 | | - "name": "kms_endpoint_type", |
246 | | - "value": "private" |
247 | | - }, |
248 | 235 | { |
249 | 236 | "name": "skip_cos_kms_auth_policy", |
250 | 237 | "value": true |
251 | 238 | }, |
| 239 | + { |
| 240 | + "name": "existing_en_crn", |
| 241 | + "value": "ref:../../members/3 - Event Notifications/outputs/crn" |
| 242 | + }, |
252 | 243 | { |
253 | 244 | "name": "scc_service_plan", |
254 | 245 | "value": "ref:../../inputs/scc_service_plan" |
|
313 | 304 | "name": "secrets_manager_crn", |
314 | 305 | "value": "ref:../../members/4b - Secrets Manager/outputs/secrets_manager_crn" |
315 | 306 | }, |
316 | | - { |
317 | | - "name": "scc_crn", |
318 | | - "value": "ref:../../members/4a - Security and Compliance Center/outputs/scc_crn" |
319 | | - }, |
320 | 307 | { |
321 | 308 | "name": "monitoring_crn", |
322 | 309 | "value": "ref:../../members/2 - Observability/outputs/cloud_monitoring_crn" |
|
333 | 320 | "name": "log_analysis_crn", |
334 | 321 | "value": "ref:../../members/2 - Observability/outputs/log_analysis_crn" |
335 | 322 | }, |
| 323 | + { |
| 324 | + "name": "scc_crn", |
| 325 | + "value": "ref:../../members/4a - Security and Compliance Center/outputs/scc_crn" |
| 326 | + }, |
336 | 327 | { |
337 | 328 | "name": "scc_workload_protection_crn", |
338 | 329 | "value": "ref:../../members/4a - Security and Compliance Center/outputs/crn" |
|
0 commit comments