Skip to content

Commit d31e7b9

Browse files
author
Rajat Agrawal
committed
feat: addon poc content taken from vburckhardt/addon-poc Repo - sec Branch
1 parent 4fab4cd commit d31e7b9

File tree

3 files changed

+412
-422
lines changed

3 files changed

+412
-422
lines changed

.gitignore

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Local .terraform directories
2+
**/.terraform/*
3+
4+
# .tfstate files
5+
*.tfstate
6+
*.tfstate.*
7+
8+
# Crash log files
9+
crash.log
10+
crash.*.log
11+
12+
# Exclude all .tfvars files, which are likely to contain sensitive data, such as
13+
# password, private keys, and other secrets. These should not be part of version
14+
# control as they are data points which are potentially sensitive and subject
15+
# to change depending on the environment.
16+
*.tfvars
17+
*.tfvars.json
18+
19+
# Ignore override files as they are usually used to override resources locally and so
20+
# are not checked in
21+
override.tf
22+
override.tf.json
23+
*_override.tf
24+
*_override.tf.json
25+
26+
# Ignore transient lock info files created by terraform apply
27+
.terraform.tfstate.lock.info
28+
29+
# Include override files you do wish to add to version control using negated pattern
30+
# !example_override.tf
31+
32+
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
33+
# example: *tfplan*
34+
35+
# Ignore CLI configuration files
36+
.terraformrc
37+
terraform.rc

ibm_catalog.json

Lines changed: 52 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,10 @@
22
"products": [
33
{
44
"label": "IBM Cloud Essential Security and Observability Services",
5-
"name": "deploy-arch-ibm-core-security-svcs",
5+
"name": "Core_Security_Services",
6+
"version": "1.3.4",
67
"product_kind": "solution",
78
"tags": [
8-
"solution",
9-
"support_ibm",
10-
"target_terraform",
119
"security",
1210
"ibm_created"
1311
],
@@ -28,10 +26,8 @@
2826
],
2927
"short_description": "Deploy core security and other supporting services to get set up to manage the security compliance of the resources in your account.",
3028
"long_description": "Get IBM Cloud’s suite of core security services with a single deployment enabling you to securely manage keys and secrets and run security and compliance scans so that you always know the posture of the resources in your account. You can also take advantage of an event notification routing service that notifies you to critical events that occur in your IBM Cloud account and observability services that provide enterprise-grade monitoring and logging giving you operational visibility into the performance and health of your apps, services, and infrastructure.",
31-
"provider_name": "IBM",
32-
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/stack-ibm-core-security-services/main/reference-architectures/light-theme.svg",
3329
"offering_docs_url": "https://cloud.ibm.com/docs/security-services?topic=security-services-overview",
34-
"support_details": "If you’re experiencing issues with this product, review the troubleshooting information available from the “Docs” link in the Related links section. If you can’t resolve your problem, click “Get help” in the related links and create a case.",
30+
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/stack-ibm-core-security-services/main/reference-architectures/light-theme.svg",
3531
"features": [
3632
{
3733
"title": "Creates an IBM Key Protect instance",
@@ -66,6 +62,14 @@
6662
{
6763
"label": "Standard",
6864
"name": "standard",
65+
"licenses": [
66+
{
67+
"id": "LICENSE",
68+
"name": "LICENSE",
69+
"type": "text/plain",
70+
"description": "LICENSE"
71+
}
72+
],
6973
"compliance": {
7074
"authority": "scc-v3",
7175
"profiles": [
@@ -130,7 +134,7 @@
130134
{
131135
"title": "Optionally configure an IBM Secrets Manager IAM credentials engine to an IBM Secrets Manager instance.",
132136
"description": "Optionally configure an IBM Secrets Manager IAM credentials engine to an IBM Secrets Manager instance."
133-
},
137+
},
134138
{
135139
"title": "Creates an IBM Security and Compliance Center instance",
136140
"description": "Creates and configures an IBM Security Compliance Center instance."
@@ -156,6 +160,39 @@
156160
}
157161
]
158162
},
163+
"dependencies": [
164+
{
165+
"name": "deploy-arch-ibm-observability",
166+
"id": "231fad60-b8ac-4540-bc34-ae1e4379d46f-global",
167+
"flavors": [
168+
"instances"
169+
],
170+
"catalog_id": "0fbd7aba-de09-43bf-b848-ade81f4ad0ff",
171+
"optional": true,
172+
"input_mapping": [
173+
{
174+
"dependency_output": "cloud_monitoring_crn",
175+
"version_input": "cloud_monitoring_crn"
176+
}
177+
]
178+
},
179+
{
180+
"name": "deploy-arch-ibm-account-infra-base",
181+
"id": "9fcd1945-8ebc-4072-85dc-6400653e7077-global",
182+
"flavors": [
183+
"standard"
184+
],
185+
"catalog_id": "0fbd7aba-de09-43bf-b848-ade81f4ad0ff",
186+
"optional": true,
187+
"input_mapping": [
188+
{
189+
"dependency_output": "security_group_group_name",
190+
"version_input": "existing_resource_group_name"
191+
}
192+
]
193+
}
194+
],
195+
"release_notes_url": "https://cloud.ibm.com/docs/security-services?topic=security-services-css-relnotes",
159196
"configuration": [
160197
{
161198
"key": "prefix",
@@ -201,13 +238,6 @@
201238
}
202239
}
203240
},
204-
{
205-
"key": "enable_platform_logs_metrics",
206-
"type": "boolean",
207-
"default_value": true,
208-
"description": "Whether to provision logging and monitoring instances are configured to receive all platform logs and metrics in the target region. There can only be one instance per region provisioned for platform logs/metrics.",
209-
"required": false
210-
},
211241
{
212242
"key": "existing_kms_instance_crn",
213243
"type": "string",
@@ -222,13 +252,6 @@
222252
"description": "List of emails to configure event notifications.",
223253
"required": false
224254
},
225-
{
226-
"key" : "existing_en_instance_crn",
227-
"type": "string",
228-
"default_value": "__NULL__",
229-
"description": "The CRN of existing event notification instance. If not supplied, a new instance is created.",
230-
"required": false
231-
},
232255
{
233256
"key": "existing_secrets_manager_crn",
234257
"type": "string",
@@ -276,46 +299,18 @@
276299
"value": "security-compliance-center-trial-plan"
277300
}
278301
]
279-
}
280-
],
281-
"outputs": [
282-
{
283-
"key": "key_management_service_instance_crn",
284-
"description": "The CRN of the Hyper Protect Crypto Service instance or Key Protect instance."
285-
},
286-
{
287-
"key": "secrets_manager_crn",
288-
"description": "The CRN of the Secrets Manager instance."
289-
},
290-
{
291-
"key": "scc_crn",
292-
"description": "The CRN of the Security and Compliance Center instance."
293302
},
294303
{
295-
"key": "monitoring_crn",
296-
"description": "The crn of the IBM Cloud Monitoring instance."
297-
},
298-
{
299-
"key": "cos_instance_crn",
300-
"description": "The crn of the Cloud Object Storage instance."
301-
},
302-
{
303-
"key": "en_crn",
304-
"description": "The crn of the Event Notifications instance."
305-
},
306-
{
307-
"key": "log_analysis_crn",
308-
"description": "The id of the provisioned Log Analysis instance."
309-
},
310-
{
311-
"key": "scc_workload_protection_crn",
312-
"description": "SCC Workload Protection instance CRN."
304+
"key": "cloud_monitoring_crn",
305+
"type": "string",
306+
"default_value": "__NULL__",
307+
"description": "The crn of an existing cloud monitoring instance.",
308+
"required": false
313309
}
314310
],
315-
"install_type": "fullstack",
316-
"release_notes_url": "https://cloud.ibm.com/docs/security-services?topic=security-services-css-relnotes"
311+
"install_type": "extension"
317312
}
318313
]
319314
}
320315
]
321-
}
316+
}

0 commit comments

Comments
 (0)