You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -299,9 +300,12 @@ Optionally, you need the following permissions to attach Access Management tags
299
300
| <a name="input_disable_public_endpoint"></a> [disable\_public\_endpoint](#input\_disable\_public\_endpoint) | Whether access to the public service endpoint is disabled when the cluster is created. Does not affect existing clusters. You can't disable a public endpoint on an existing cluster, so you can't convert a public cluster to a private cluster. To change a public endpoint to private, create another cluster with this input set to `true`. | `bool` | `false` | no |
300
301
| <a name="input_enable_ocp_console"></a> [enable\_ocp\_console](#input\_enable\_ocp\_console) | Flag to specify whether to enable or disable the OpenShift console. If set to `null` the module will not modify the setting currently set on the cluster. Bare in mind when setting this to `true` or `false` on a cluster with private only endpoint enabled, the runtime must be able to access the private endpoint. | `bool` | `null` | no |
301
302
| <a name="input_enable_registry_storage"></a> [enable\_registry\_storage](#input\_enable\_registry\_storage) | Set to `true` to enable IBM Cloud Object Storage for the Red Hat OpenShift internal image registry. Set to `false` only for new cluster deployments in an account that is allowlisted for this feature. | `bool` | `true` | no |
303
+
| <a name="input_enable_secrets_manager_for_ingress"></a> [enable\_secrets\_manager\_for\_ingress](#input\_enable\_secrets\_manager\_for\_ingress) | Whether to enable secrets manager for storing ingress certificate. | `bool` | `false` | no |
302
304
| <a name="input_existing_cos_id"></a> [existing\_cos\_id](#input\_existing\_cos\_id) | The COS id of an already existing COS instance to use for OpenShift internal registry storage. Only required if 'enable\_registry\_storage' and 'use\_existing\_cos' are true. | `string` | `null` | no |
305
+
| <a name="input_existing_secrets_manager_instance_crn"></a> [existing\_secrets\_manager\_instance\_crn](#input\_existing\_secrets\_manager\_instance\_crn) | CRN of secrets manager instance where ingress certificate secrets will be stored. | `string` | `null` | no |
303
306
| <a name="input_force_delete_storage"></a> [force\_delete\_storage](#input\_force\_delete\_storage) | Flag indicating whether or not to delete attached storage when destroying the cluster - Default: false | `bool` | `false` | no |
304
307
| <a name="input_ignore_worker_pool_size_changes"></a> [ignore\_worker\_pool\_size\_changes](#input\_ignore\_worker\_pool\_size\_changes) | Enable if using worker autoscaling. Stops Terraform managing worker count | `bool` | `false` | no |
308
+
| <a name="input_is_default_secrets_manager_instance"></a> [is\_default\_secrets\_manager\_instance](#input\_is\_default\_secrets\_manager\_instance) | Whether the secrets manager instance provided will be default for storing ingress certificates. | `bool` | `true` | no |
305
309
| <a name="input_kms_config"></a> [kms\_config](#input\_kms\_config) | Use to attach a KMS instance to the cluster. If account\_id is not provided, defaults to the account in use. | <pre>object({<br/> crk_id = string<br/> instance_id = string<br/> private_endpoint = optional(bool, true) # defaults to true<br/> account_id = optional(string) # To attach KMS instance from another account<br/> wait_for_apply = optional(bool, true) # defaults to true so terraform will wait until the KMS is applied to the master, ready and deployed<br/> })</pre> | `null` | no |
306
310
| <a name="input_manage_all_addons"></a> [manage\_all\_addons](#input\_manage\_all\_addons) | Instructs Terraform to manage all cluster addons, even if addons were installed outside of the module. If set to 'true' this module will destroy any addons that were installed by other sources. | `bool` | `false` | no |
307
311
| <a name="input_number_of_lbs"></a> [number\_of\_lbs](#input\_number\_of\_lbs) | The number of LBs to associated the `additional_lb_security_group_names` security group with. | `number` | `1` | no |
@@ -310,6 +314,7 @@ Optionally, you need the following permissions to attach Access Management tags
310
314
| <a name="input_pod_subnet_cidr"></a> [pod\_subnet\_cidr](#input\_pod\_subnet\_cidr) | Specify a custom subnet CIDR to provide private IP addresses for pods. The subnet must have a CIDR of at least `/23` or larger. Default value is `172.30.0.0/16` when the variable is set to `null`. | `string` | `null` | no |
311
315
| <a name="input_region"></a> [region](#input\_region) | The IBM Cloud region where the cluster will be provisioned. | `string` | n/a | yes |
312
316
| <a name="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id) | The Id of an existing IBM Cloud resource group where the cluster will be grouped. | `string` | n/a | yes |
317
+
| <a name="input_secrets_manager_secret_group_id"></a> [secrets\_manager\_secret\_group\_id](#input\_secrets\_manager\_secret\_group\_id) | Secret group id where ingress secrets will be kept in the secrets manager instance. If not specified, default group will be used. | `string` | `""` | no |
313
318
| <a name="input_service_subnet_cidr"></a> [service\_subnet\_cidr](#input\_service\_subnet\_cidr) | Specify a custom subnet CIDR to provide private IP addresses for services. The subnet must be at least `/24` or larger. Default value is `172.21.0.0/16` when the variable is set to `null`. | `string` | `null` | no |
314
319
| <a name="input_tags"></a> [tags](#input\_tags) | Metadata labels describing this cluster deployment, i.e. test | `list(string)` | `[]` | no |
315
320
| <a name="input_use_existing_cos"></a> [use\_existing\_cos](#input\_use\_existing\_cos) | Flag indicating whether or not to use an existing COS instance for OpenShift internal registry storage. Only applicable if 'enable\_registry\_storage' is true | `bool` | `false` | no |
@@ -330,6 +335,7 @@ Optionally, you need the following permissions to attach Access Management tags
330
335
| <a name="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name) | Name of the created cluster |
331
336
| <a name="output_cos_crn"></a> [cos\_crn](#output\_cos\_crn) | CRN of the COS instance |
332
337
| <a name="output_ingress_hostname"></a> [ingress\_hostname](#output\_ingress\_hostname) | The hostname that was assigned to your Ingress subdomain. |
338
+
| <a name="output_ingress_secrets_group"></a> [ingress\_secrets\_group](#output\_ingress\_secrets\_group) | Info of secrets group for storing ingress certificates |
Copy file name to clipboardExpand all lines: outputs.tf
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -104,3 +104,8 @@ output "registry_vpe" {
104
104
description="Info about the registry VPE, if it exists. For more info about schema, see https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/data-sources/is_virtual_endpoint_gateway"
105
105
value=local.registry_vpe_id
106
106
}
107
+
108
+
output"ingress_secrets_group" {
109
+
description="Info of secrets group for storing ingress certificates"
Copy file name to clipboardExpand all lines: solutions/fully-configurable/README.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,16 +71,19 @@ The following resources are provisioned by this example:
71
71
| <aname="input_disable_public_endpoint"></a> [disable\_public\_endpoint](#input\_disable\_public\_endpoint)| Whether access to the public service endpoint is disabled when the cluster is created. Does not affect existing clusters. You can't disable a public endpoint on an existing cluster, so you can't convert a public cluster to a private cluster. To change a public endpoint to private, create another cluster with this input set to `true`. |`bool`|`true`| no |
72
72
| <aname="input_enable_autoscaling_for_default_pool"></a> [enable\_autoscaling\_for\_default\_pool](#input\_enable\_autoscaling\_for\_default\_pool)| Set `true` to enable automatic scaling of worker based on workload demand. |`bool`|`false`| no |
73
73
| <aname="input_enable_ocp_console"></a> [enable\_ocp\_console](#input\_enable\_ocp\_console)| Flag to specify whether to enable or disable the OpenShift console. If set to `null` the module will not modify the setting currently set on the cluster. Bare in mind when setting this to `true` or `false` on a cluster with private only endpoint enabled, the runtime must be able to access the private endpoint. |`bool`|`null`| no |
74
+
| <aname="input_enable_secrets_manager_for_ingress"></a> [enable\_secrets\_manager\_for\_ingress](#input\_enable\_secrets\_manager\_for\_ingress)| Whether to enable secrets manager for storing ingress certificate. |`bool`|`false`| no |
74
75
| <aname="input_existing_boot_volume_kms_key_crn"></a> [existing\_boot\_volume\_kms\_key\_crn](#input\_existing\_boot\_volume\_kms\_key\_crn)| The CRN of an existing KMS key to use to encrypt the the block storage volumes for VPC. If no value is set for this variable, specify a value for either the `existing_kms_instance_crn` variable to create a key ring and key. |`string`|`null`| no |
75
76
| <aname="input_existing_cluster_kms_key_crn"></a> [existing\_cluster\_kms\_key\_crn](#input\_existing\_cluster\_kms\_key\_crn)| The CRN of an existing KMS key to use for encrypting the Object Storage of the Cluster. If no value is set for this variable, please specify a value for `existing_kms_instance_crn` variable to create a key ring and key. |`string`|`null`| no |
76
77
| <aname="input_existing_cos_instance_crn"></a> [existing\_cos\_instance\_crn](#input\_existing\_cos\_instance\_crn)| The CRN of an already existing Object Storage instance to use for OpenShift internal registry storage. |`string`| n/a | yes |
77
78
| <aname="input_existing_kms_instance_crn"></a> [existing\_kms\_instance\_crn](#input\_existing\_kms\_instance\_crn)| The CRN of an existing KMS instance (Hyper Protect Crypto Services or Key Protect). If the KMS instance is in different account you must also provide a value for `ibmcloud_kms_api_key`. |`string`|`null`| no |
78
79
| <aname="input_existing_resource_group_name"></a> [existing\_resource\_group\_name](#input\_existing\_resource\_group\_name)| The name of an existing resource group to provision the cluster. |`string`|`"Default"`| no |
80
+
| <aname="input_existing_secrets_manager_instance_crn"></a> [existing\_secrets\_manager\_instance\_crn](#input\_existing\_secrets\_manager\_instance\_crn)| CRN of secrets manager instance where ingress certificate secrets will be stored. |`string`|`null`| no |
79
81
| <aname="input_existing_subnet_ids"></a> [existing\_subnet\_ids](#input\_existing\_subnet\_ids)| The list of IDs of existing subnets where the default worker pool nodes of the cluster will be provisioned. |`list(string)`|`[]`| no |
80
82
| <aname="input_existing_vpc_crn"></a> [existing\_vpc\_crn](#input\_existing\_vpc\_crn)| The CRN of an existing VPC. If the user provides only the `existing_vpc_crn` the default worker pool will be provisioned across all the subnets in the VPC. |`string`| n/a | yes |
81
83
| <aname="input_ibmcloud_api_key"></a> [ibmcloud\_api\_key](#input\_ibmcloud\_api\_key)| The IBM Cloud api key. |`string`| n/a | yes |
82
84
| <aname="input_ibmcloud_kms_api_key"></a> [ibmcloud\_kms\_api\_key](#input\_ibmcloud\_kms\_api\_key)| The IBM Cloud API key that can create a root key and key ring in the key management service (KMS) instance for the cluster. If not specified, the 'ibmcloud\_api\_key' variable is used. Specify this key if the KMS instance in `existing_kms_instance_crn` is in an account that is different from the cluster's account. Leave this input empty if both the cluster and the KMS instance are in the same account. |`string`|`null`| no |
83
85
| <aname="input_ignore_worker_pool_size_changes"></a> [ignore\_worker\_pool\_size\_changes](#input\_ignore\_worker\_pool\_size\_changes)| Enable if using worker autoscaling. Stops Terraform managing worker count. |`bool`|`false`| no |
86
+
| <aname="input_is_default_secrets_manager_instance"></a> [is\_default\_secrets\_manager\_instance](#input\_is\_default\_secrets\_manager\_instance)| Whether the secrets manager instance provided will be default for storing ingress certificates. |`bool`|`true`| no |
84
87
| <aname="input_kms_encryption_enabled_boot_volume"></a> [kms\_encryption\_enabled\_boot\_volume](#input\_kms\_encryption\_enabled\_boot\_volume)| Set this to true to control the encryption keys used to encrypt the data that for the block storage volumes for VPC. If set to false, the data is encrypted by using randomly generated keys. For more info on encrypting block storage volumes, see https://cloud.ibm.com/docs/vpc?topic=vpc-creating-instances-byok|`bool`|`false`| no |
85
88
| <aname="input_kms_encryption_enabled_cluster"></a> [kms\_encryption\_enabled\_cluster](#input\_kms\_encryption\_enabled\_cluster)| Set to true to enable KMS encryption for the cluster's Object Storage bucket. When set to true, a value must be passed for either `existing_cluster_kms_key_crn` or `existing_kms_instance_crn`. |`bool`|`false`| no |
86
89
| <aname="input_kms_endpoint_type"></a> [kms\_endpoint\_type](#input\_kms\_endpoint\_type)| The endpoint for communicating with the KMS instance. Possible values: `public`, `private`. Applies only if `kms_encryption_enabled_cluster` is true |`string`|`"private"`| no |
@@ -91,6 +94,7 @@ The following resources are provisioned by this example:
91
94
| <aname="input_pod_subnet_cidr"></a> [pod\_subnet\_cidr](#input\_pod\_subnet\_cidr)| Specify a custom subnet CIDR to provide private IP addresses for pods. The subnet must have a CIDR of at least `/23` or larger. Default value is `172.30.0.0/16` when the variable is set to `null`. |`string`|`null`| no |
92
95
| <aname="input_prefix"></a> [prefix](#input\_prefix)| The prefix to add to all resources that this solution creates (e.g `prod`, `test`, `dev`). To not use any prefix value, you can set this value to `null` or an empty string. |`string`| n/a | yes |
93
96
| <aname="input_provider_visibility"></a> [provider\_visibility](#input\_provider\_visibility)| Set the visibility value for the IBM terraform provider. Supported values are `public`, `private`, `public-and-private`. [Learn more](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/guides/custom-service-endpoints). |`string`|`"private"`| no |
97
+
| <aname="input_secrets_manager_secret_group_id"></a> [secrets\_manager\_secret\_group\_id](#input\_secrets\_manager\_secret\_group\_id)| Secret group id where ingress secrets will be kept in the secrets manager instance. If not specified, default group will be used. |`string`|`""`| no |
94
98
| <aname="input_service_subnet_cidr"></a> [service\_subnet\_cidr](#input\_service\_subnet\_cidr)| Specify a custom subnet CIDR to provide private IP addresses for services. The subnet must be at least `/24` or larger. Default value is `172.21.0.0/16` when the variable is set to `null`. |`string`|`null`| no |
95
99
| <aname="input_use_private_endpoint"></a> [use\_private\_endpoint](#input\_use\_private\_endpoint)| Set this to true to force all api calls to use the IBM Cloud private endpoints. |`bool`|`true`| no |
96
100
| <aname="input_verify_worker_network_readiness"></a> [verify\_worker\_network\_readiness](#input\_verify\_worker\_network\_readiness)| By setting this to true, a script will run kubectl commands to verify that all worker nodes can communicate successfully with the master. If the runtime does not have access to the kube cluster to run kubectl commands, this should be set to false. |`bool`|`true`| no |
@@ -106,6 +110,7 @@ The following resources are provisioned by this example:
106
110
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| The name of the provisioned OpenShift cluster. |
107
111
| <aname="output_cos_crn"></a> [cos\_crn](#output\_cos\_crn)| The Cloud Resource Name (CRN) of the Object Storage instance associated with the cluster. |
108
112
| <aname="output_ingress_hostname"></a> [ingress\_hostname](#output\_ingress\_hostname)| The hostname assigned to the Cluster's Ingress subdomain for external access. |
113
+
| <aname="output_ingress_secrets_group"></a> [ingress\_secrets\_group](#output\_ingress\_secrets\_group)| Info of secrets group for storing ingress certificates |
109
114
| <aname="output_kms_config"></a> [kms\_config](#output\_kms\_config)| Configuration details for Key Management Service (KMS) used for encryption in the cluster. |
110
115
| <aname="output_master_status"></a> [master\_status](#output\_master\_status)| The current status of the Kubernetes master node in the cluster. |
111
116
| <aname="output_master_url"></a> [master\_url](#output\_master\_url)| The API endpoint URL for the Kubernetes master node of the cluster. |
Copy file name to clipboardExpand all lines: solutions/fully-configurable/outputs.tf
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -101,3 +101,8 @@ output "registry_vpe" {
101
101
description="Details of the registry Virtual Private Endpoint (VPE), if it exists. For more info about schema, see https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/data-sources/is_virtual_endpoint_gateway"
102
102
value=module.ocp_base.registry_vpe
103
103
}
104
+
105
+
output"ingress_secrets_group" {
106
+
description="Info of secrets group for storing ingress certificates"
0 commit comments