Skip to content

Commit 563c48a

Browse files
Vipin KumarVipin Kumar
authored andcommitted
SKIP UPGRADE TEST
1 parent 8d97461 commit 563c48a

File tree

10 files changed

+957
-45
lines changed

10 files changed

+957
-45
lines changed

.catalog-onboard-pipeline.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
apiVersion: v1
3+
offerings:
4+
- name: deploy-arch-ibm-activity-tracker
5+
kind: solution
6+
catalog_id: 7df1e4ca-d54c-4fd0-82ce-3d13247308cd
7+
offering_id:
8+
variations:
9+
- name: fully-configurable
10+
mark_ready: true
11+
install_type: fullstack
12+
scc:
13+
instance_id: 1c7d5f78-9262-44c3-b779-b28fe4d88c37
14+
region: us-south

ibm_catalog.json

Lines changed: 264 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,264 @@
1+
{
2+
"products": [
3+
{
4+
"name": "deploy-arch-ibm-activity-tracker",
5+
"label": "Cloud automation for Activity tracker",
6+
"product_kind": "solution",
7+
"tags": [
8+
"ibm_created",
9+
"target_terraform",
10+
"terraform",
11+
"solution"
12+
],
13+
"keywords": [
14+
"IaC",
15+
"infrastructure as code",
16+
"terraform",
17+
"solution",
18+
"observability",
19+
"ATracker"
20+
],
21+
"short_description": "Configures IBM Cloud Activity tracker resources",
22+
"long_description": "Solution that support configuring IBM Cloud Observability resources for activity tracking.",
23+
"offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-activity-tracker/blob/main/README.md",
24+
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-observability-da/main/images/observability-icon.svg",
25+
"provider_name": "IBM",
26+
"features": [
27+
{
28+
"title": "Configures IBM Cloud Activity Tracker Event Routing",
29+
"description": "Configures an IBM Cloud Activity Tracker route with a Cloud Object Storage and Cloud Logs target."
30+
}
31+
],
32+
"support_details": "This product is in the community registry and support is handled in the source repo. You can open an issue at [https://github.com/terraform-ibm-modules/terraform-ibm-activity-tracker/issues](https://github.com/terraform-ibm-modules/terraform-ibm-activity-tracker/issues). Support is not offered through IBM Cloud Support.",
33+
"flavors": [
34+
{
35+
"label": "Fully configurable",
36+
"name": "fully-configurable",
37+
"install_type": "fullstack",
38+
"working_directory": "solutions/fully-configurable",
39+
"iam_permissions": [
40+
{
41+
"service_name": "atracker",
42+
"role_crns": [
43+
"crn:v1:bluemix:public:iam::::serviceRole:Writer",
44+
"crn:v1:bluemix:public:iam::::role:Editor"
45+
]
46+
},
47+
{
48+
"role_crns": [
49+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
50+
"crn:v1:bluemix:public:iam::::role:Editor"
51+
],
52+
"service_name": "hs-crypto"
53+
},
54+
{
55+
"role_crns": [
56+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
57+
"crn:v1:bluemix:public:iam::::role:Editor"
58+
],
59+
"service_name": "kms"
60+
},
61+
{
62+
"role_crns": [
63+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
64+
"crn:v1:bluemix:public:iam::::role:Editor"
65+
],
66+
"service_name": "cloud-object-storage"
67+
}
68+
],
69+
"compliance": {
70+
"authority": "scc-v3",
71+
"profiles": [
72+
{
73+
"profile_name": "IBM Cloud Framework for Financial Services",
74+
"profile_version": "1.7.0"
75+
}
76+
]
77+
},
78+
"configuration": [
79+
{
80+
"key": "ibmcloud_api_key"
81+
},
82+
{
83+
"key": "provider_visibility",
84+
"options": [
85+
{
86+
"displayname": "private",
87+
"value": "private"
88+
},
89+
{
90+
"displayname": "public",
91+
"value": "public"
92+
},
93+
{
94+
"displayname": "public-and-private",
95+
"value": "public-and-private"
96+
}
97+
]
98+
},
99+
{
100+
"key": "prefix",
101+
"required": true
102+
},
103+
{
104+
"key": "existing_resource_group_name"
105+
},
106+
{
107+
"custom_config": {
108+
"type": "region",
109+
"grouping": "deployment",
110+
"original_grouping": "deployment",
111+
"config_constraints": {
112+
"showKinds": [
113+
"region"
114+
]
115+
}
116+
},
117+
"key": "region",
118+
"required": true
119+
},
120+
{
121+
"key": "enable_at_event_routing_to_cos_bucket"
122+
},
123+
{
124+
"key": "enable_at_event_routing_to_cloud_logs"
125+
},
126+
{
127+
"key": "existing_cloud_logs_instance_crn"
128+
},
129+
{
130+
"key": "cos_region"
131+
},
132+
{
133+
"key": "at_cos_bucket_retention_policy"
134+
},
135+
{
136+
"key": "add_bucket_name_suffix"
137+
},
138+
{
139+
"key": "at_cos_target_bucket_name"
140+
},
141+
{
142+
"key": "at_cos_bucket_access_tags"
143+
},
144+
{
145+
"key": "at_cos_target_bucket_class",
146+
"options": [
147+
{
148+
"displayname": "standard",
149+
"value": "standard"
150+
},
151+
{
152+
"displayname": "vault",
153+
"value": "vault"
154+
},
155+
{
156+
"displayname": "cold",
157+
"value": "cold"
158+
},
159+
{
160+
"displayname": "smart",
161+
"value": "smart"
162+
},
163+
{
164+
"displayname": "onerate_active",
165+
"value": "onerate_active"
166+
}
167+
]
168+
},
169+
{
170+
"key": "management_endpoint_type_for_bucket",
171+
"options": [
172+
{
173+
"displayname": "public",
174+
"value": "public"
175+
},
176+
{
177+
"displayname": "private",
178+
"value": "private"
179+
},
180+
{
181+
"displayname": "direct",
182+
"value": "direct"
183+
}
184+
]
185+
},
186+
{
187+
"key": "existing_cos_instance_crn"
188+
},
189+
{
190+
"key": "existing_at_cos_target_bucket_name"
191+
},
192+
{
193+
"key": "existing_at_cos_target_bucket_endpoint"
194+
},
195+
{
196+
"key": "skip_cos_kms_auth_policy"
197+
},
198+
{
199+
"key": "skip_at_cos_auth_policy"
200+
},
201+
{
202+
"key": "kms_encryption_enabled_buckets"
203+
},
204+
{
205+
"key": "existing_cos_kms_key_crn"
206+
},
207+
{
208+
"key": "existing_kms_instance_crn",
209+
"required": true
210+
},
211+
{
212+
"key": "cos_key_name"
213+
},
214+
{
215+
"key": "cos_key_ring_name"
216+
},
217+
{
218+
"key": "ibmcloud_cos_api_key"
219+
},
220+
{
221+
"key": "ibmcloud_kms_api_key"
222+
},
223+
{
224+
"key": "kms_endpoint_type",
225+
"options": [
226+
{
227+
"displayname": "public",
228+
"value": "public"
229+
},
230+
{
231+
"displayname": "private",
232+
"value": "private"
233+
}
234+
]
235+
}
236+
],
237+
"architecture": {
238+
"descriptions": "This architecture supports the deployment of IBM Cloud Activity Tracker Event Routing to an Object Storage bucket and Cloud Logs target.",
239+
"features": [
240+
{
241+
"title": "Creates KMS-encrypted Object Storage buckets for log files and Activity Tracker events",
242+
"description": "Creates and configures the IBM Cloud Object Storage buckets with archiving and expiration enabled."
243+
},
244+
{
245+
"title": "Creates an IBM Cloud Activity Tracker event route to an Object Storage bucket and Cloud Logs target",
246+
"description": "Creates and configures the IBM Cloud Activity Tracker Event Routing to an IBM Cloud Object Storage bucket and IBM Cloud Logs target."
247+
}
248+
],
249+
"diagrams": [
250+
{
251+
"diagram": {
252+
"caption": "Activity tracker deployment on IBM Cloud",
253+
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-observability-da/main/reference-architecture/deployable-architecture-observability-instances.svg",
254+
"type": "image/svg+xml"
255+
},
256+
"description": "This architecture supports creating IBM Cloud Activity Tracker Event Routing to an Object Storage bucket and Cloud Logs instance."
257+
}
258+
]
259+
}
260+
}
261+
]
262+
}
263+
]
264+
}

reference-architecture/deployable-architecture-activity-tracker.svg

Lines changed: 4 additions & 0 deletions
Loading
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"existing_cos_instance_crn": $COS_INSTANCE_CRN
3+
}

0 commit comments

Comments
 (0)