Skip to content

Commit 546e3c3

Browse files
fix: add compliance controls to the OCP DA QuickStart variation (#783)
1 parent 78564af commit 546e3c3

File tree

7 files changed

+32
-17
lines changed

7 files changed

+32
-17
lines changed

.catalog-onboard-pipeline.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,3 +18,7 @@ offerings:
1818
- name: quickstart
1919
mark_ready: true
2020
install_type: fullstack
21+
scc:
22+
instance_id: 1c7d5f78-9262-44c3-b779-b28fe4d88c37
23+
region: us-south
24+
scope_resource_group_var_name: existing_resource_group_name

ibm_catalog.json

Lines changed: 22 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@
8686
"crn:v1:bluemix:public:iam::::role:Viewer"
8787
],
8888
"service_name": "Resource group only",
89-
"notes":"Viewer access is required in the resource group you want to provision in."
89+
"notes": "Viewer access is required in the resource group you want to provision in."
9090
},
9191
{
9292
"role_crns": [
@@ -785,7 +785,7 @@
785785
"key": "subnets",
786786
"type": "object",
787787
"default_value": "{\n zone-1 = [\n {\n name = \"subnet-a\"\n cidr = \"10.10.10.0/24\"\n public_gateway = true\n acl_name = \"vpc-acl\"\n no_addr_prefix = false\n }\n ],\n zone-2 = [\n {\n name = \"subnet-b\"\n cidr = \"10.20.10.0/24\"\n public_gateway = false\n acl_name = \"vpc-acl\"\n no_addr_prefix = false\n }\n ],\n zone-3 = [\n {\n name = \"subnet-c\"\n cidr = \"10.30.10.0/24\"\n public_gateway = false\n acl_name = \"vpc-acl\"\n no_addr_prefix = false\n }\n ]\n }",
788-
"description": "List of subnets for the vpc. For each item in each array, a subnet will be created. Items can be either CIDR blocks or total ipv4 addressess. Public gateways will be enabled only in zones where a gateway has been created. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone-vpc/blob/main/solutions/fully-configurable/DA-types.md#subnets-).",
788+
"description": "List of subnets for the vpc. For each item in each array, a subnet will be created. Items can be either CIDR blocks or total ipv4 addresses. Public gateways will be enabled only in zones where a gateway has been created. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone-vpc/blob/main/solutions/fully-configurable/DA-types.md#subnets-).",
789789
"required": false,
790790
"virtual": true
791791
},
@@ -1059,6 +1059,15 @@
10591059
"index": 1,
10601060
"install_type": "fullstack",
10611061
"working_directory": "solutions/quickstart",
1062+
"compliance": {
1063+
"authority": "scc-v3",
1064+
"profiles": [
1065+
{
1066+
"profile_name": "CIS IBM Cloud Foundations Benchmark v1.1.0",
1067+
"profile_version": "1.1.0"
1068+
}
1069+
]
1070+
},
10621071
"iam_permissions": [
10631072
{
10641073
"service_name": "containers-kubernetes",
@@ -1084,19 +1093,19 @@
10841093
"notes": "Required for creating Virtual Private Cloud (VPC)."
10851094
},
10861095
{
1087-
"service_name": "cloud-object-storage",
1088-
"role_crns": [
1089-
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
1090-
"crn:v1:bluemix:public:iam::::role:Editor"
1091-
],
1092-
"notes": "Required for creating the OpenShift cluster's internal registry storage bucket."
1096+
"service_name": "cloud-object-storage",
1097+
"role_crns": [
1098+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
1099+
"crn:v1:bluemix:public:iam::::role:Editor"
1100+
],
1101+
"notes": "Required for creating the OpenShift cluster's internal registry storage bucket."
10931102
},
10941103
{
10951104
"role_crns": [
10961105
"crn:v1:bluemix:public:iam::::role:Viewer"
10971106
],
10981107
"service_name": "Resource group only",
1099-
"notes":"Viewer access is required in the resource group you want to provision in."
1108+
"notes": "Viewer access is required in the resource group you want to provision in."
11001109
}
11011110
],
11021111
"architecture": {
@@ -1246,7 +1255,7 @@
12461255
},
12471256
{
12481257
"key": "access_tags",
1249-
"hidden":true,
1258+
"hidden": true,
12501259
"custom_config": {
12511260
"type": "array",
12521261
"grouping": "deployment",
@@ -1262,7 +1271,9 @@
12621271
{
12631272
"key": "disable_outbound_traffic_protection"
12641273
}
1265-
]
1274+
],
1275+
"dependency_version_2": true,
1276+
"terraform_version": "1.10.5"
12661277
}
12671278
]
12681279
}

modules/kube-audit/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ No modules.
8080

8181
| Name | Description | Type | Default | Required |
8282
|------|-------------|------|---------|:--------:|
83-
| <a name="input_audit_deployment_name"></a> [audit\_deployment\_name](#input\_audit\_deployment\_name) | The name of log collection deployement and service. | `string` | `"ibmcloud-kube-audit"` | no |
83+
| <a name="input_audit_deployment_name"></a> [audit\_deployment\_name](#input\_audit\_deployment\_name) | The name of log collection deployment and service. | `string` | `"ibmcloud-kube-audit"` | no |
8484
| <a name="input_audit_log_policy"></a> [audit\_log\_policy](#input\_audit\_log\_policy) | Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `WriteRequestBodies`. | `string` | `"default"` | no |
8585
| <a name="input_audit_namespace"></a> [audit\_namespace](#input\_audit\_namespace) | The name of the namespace where log collection service and a deployment will be created. | `string` | `"ibm-kube-audit"` | no |
8686
| <a name="input_audit_webhook_listener_image"></a> [audit\_webhook\_listener\_image](#input\_audit\_webhook\_listener\_image) | The audit webhook listener image reference in the format of `[registry-url]/[namespace]/[image]`.The sub-module uses the `icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs` image to forward logs to IBM Cloud Logs. This image is for demonstration purposes only. For a production solution, configure and maintain your own log forwarding image. | `string` | `"icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs"` | no |

modules/kube-audit/scripts/set_webhook.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ get_cloud_endpoint() {
2020

2121
get_cloud_endpoint
2222

23-
# This is a workaround function added to retrive a new token, this can be removed once this issue(https://github.com/IBM-Cloud/terraform-provider-ibm/issues/6107) is fixed.
23+
# This is a workaround function added to retrieve a new token, this can be removed once this issue(https://github.com/IBM-Cloud/terraform-provider-ibm/issues/6107) is fixed.
2424
fetch_token() {
2525
if [ "$IBMCLOUD_IAM_API_ENDPOINT" = "iam.cloud.ibm.com" ]; then
2626
if [ "$PRIVATE_ENV" = true ]; then
@@ -38,7 +38,7 @@ fetch_token() {
3838

3939
fetch_token
4040

41-
# This is a workaround function added to retrive the CA cert, this can be removed once this issue(https://github.com/IBM-Cloud/terraform-provider-ibm/issues/6068) is fixed.
41+
# This is a workaround function added to retrieve the CA cert, this can be removed once this issue(https://github.com/IBM-Cloud/terraform-provider-ibm/issues/6068) is fixed.
4242
get_ca_cert() {
4343
if [ "$IBMCLOUD_CS_API_ENDPOINT" = "containers.cloud.ibm.com" ]; then
4444
if [ "$PRIVATE_ENV" = true ]; then

modules/kube-audit/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ variable "audit_namespace" {
8181

8282
variable "audit_deployment_name" {
8383
type = string
84-
description = "The name of log collection deployement and service."
84+
description = "The name of log collection deployment and service."
8585
default = "ibmcloud-kube-audit"
8686
}
8787

solutions/fully-configurable/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -586,7 +586,7 @@ variable "audit_namespace" {
586586

587587
variable "audit_deployment_name" {
588588
type = string
589-
description = "The name of log collection deployement and service."
589+
description = "The name of log collection deployment and service."
590590
default = "ibmcloud-kube-audit"
591591
}
592592

0 commit comments

Comments
 (0)