ℹ️ Ctrl/Cmd+Click or right-click on the Schematics deploy button to open in a new tab.
An end-to-end advanced example that will provision the following:
- A new resource group if one is not passed in.
- A new Cloud Logs instance.
- A new Key Protect instance with a root key.
- A new COS instance and KMS encrypted bucket.
- An Activity Tracker target for the new COS bucket, Cloud Logs instance and Event Streams instance.
- An Activity Tracker route for the above created targets.
- A CBR (Context-Based Restrictions) zone for the Activity Tracker Event Routing service, with CBR rules protecting all target services (Cloud Logs, Event Streams, and COS bucket) to restrict access to private endpoints only from the Activity Tracker service.