diff --git a/.secrets.baseline b/.secrets.baseline
index 04c997a1..8905b89e 100644
--- a/.secrets.baseline
+++ b/.secrets.baseline
@@ -3,7 +3,7 @@
"files": "go.sum|^.secrets.baseline$",
"lines": null
},
- "generated_at": "2025-07-31T06:11:34Z",
+ "generated_at": "2025-09-05T15:37:15Z",
"plugins_used": [
{
"name": "AWSKeyDetector"
@@ -82,7 +82,7 @@
"hashed_secret": "8196b86ede820e665b2b8af9c648f4996be99838",
"is_secret": false,
"is_verified": false,
- "line_number": 89,
+ "line_number": 91,
"type": "Secret Keyword",
"verified_result": null
}
diff --git a/ibm_catalog.json b/ibm_catalog.json
index 343d9ac9..bf639695 100644
--- a/ibm_catalog.json
+++ b/ibm_catalog.json
@@ -21,7 +21,7 @@
"ROKS"
],
"short_description": "Automates the deployment of Red Hat OpenShift container platform on IBM Cloud with optional integration of security and logging services.",
- "long_description": "The Cloud automation for Red Hat OpenShift Container Platform on VPC enables a scalable and flexible cloud environment for containerized applications with seamless integration to other security and observability services. This architecture can be deployed independently while also serving as a foundational deployable architecture for other architectures like [Cloud automation for Red Hat OpenShift AI](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-ocp-ai-ba708aed-bb8a-4ac0-83a7-53a066701db5-global) to deploy mission critical applications and AI-driven initiatives to market quickly and securely with a managed OpenShift service.\n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
+ "long_description": "The Cloud automation for Red Hat OpenShift Container Platform on VPC enables a scalable and flexible cloud environment for containerized applications with seamless integration to other security and observability services such as logging, monitoring and activity tracker event routing. This architecture can be deployed independently while also serving as a foundational deployable architecture for other architectures like [Cloud automation for Red Hat OpenShift AI](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-ocp-ai-ba708aed-bb8a-4ac0-83a7-53a066701db5-global) to deploy mission critical applications and AI-driven initiatives to market quickly and securely with a managed OpenShift service.\n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
"offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/blob/main/README.md",
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/main/images/ocp_icon.svg",
"provider_name": "IBM",
@@ -54,13 +54,21 @@
"title": "Secrets Manager",
"description": "Optional integration with [Cloud automation for Secrets Manager](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-secrets-manager-6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global) for centrally managing Ingress subdomain certificates."
},
- {
- "title": "Observability",
- "description": "This solution can leverage [Cloud automation for Observability](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-observability-a3137d28-79e0-479d-8a24-758ebd5a0eab-global) that supports configuring resources for logging, monitoring and activity tracker event routing (optional)."
- },
{
"title": "Kube Audit",
"description": "Deploys the Kube Audit solution to monitor and log Kubernetes API server activity. It captures events such as user actions, configuration changes, and access attempts, helping meet security and compliance requirements through centralized [audit logging](https://cloud.ibm.com/docs/containers?topic=containers-health-audit#audit-api-server)."
+ },
+ {
+ "title": "Sets up logging for the OCP instance.",
+ "description": "Optionally, you can deploy Cloud automation for Cloud Logs to route, alert, and visualize platform logs that are generated by your OCP instance [Learn more](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-logs-63d8ae58-fbf3-41ce-b844-0fb5b85882ab-global)."
+ },
+ {
+ "title": "Sets up monitoring operational metrics for the OCP instance",
+ "description": "Optionally, you can deploy Cloud automation for Cloud Monitoring to measure how users and applications interact with your OCP instance [Learn more](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global)."
+ },
+ {
+ "title": "Sets up activity tracking for the OCP instance",
+ "description": "Optionally, you can deploy Cloud automation for Activity Tracker Event Routing to route and securely store auditing events that are related to your OCP instance [Learn more](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-activity-tracker-918453c3-4f97-4583-8c4a-83ef12fc7916-global)."
}
],
"support_details": "This product is in the community registry, as such support is handled through the originated repo. If you experience issues, please open an issue in the repository [here](https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/issues). Please note this product is not supported via the IBM Cloud Support Center.",
@@ -110,11 +118,11 @@
"notes": "[Optional] Required for managing IAM access groups."
},
{
- "service_name": "iam-identity",
"role_crns": [
"crn:v1:bluemix:public:iam::::role:Operator",
"crn:v1:bluemix:public:iam-identity::::serviceRole:UserApiKeyCreator"
],
+ "service_name": "iam-identity",
"notes": "Required to create the containers-kubernetes-key for the OpenShift cluster."
},
{
@@ -142,18 +150,18 @@
"notes": "Required to manage Object storage bucket for the cluster internal registry."
},
{
- "service_name": "containers-kubernetes",
"role_crns": [
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
"crn:v1:bluemix:public:iam::::role:Administrator"
],
+ "service_name": "containers-kubernetes",
"notes": "Required to create and manage the Openshift cluster."
},
{
- "service_name": "is.vpc",
"role_crns": [
"crn:v1:bluemix:public:iam::::role:Editor"
],
+ "service_name": "is.vpc",
"notes": "Required to create VPC."
},
{
@@ -178,28 +186,44 @@
"crn:v1:bluemix:public:iam::::role:Editor"
],
"service_name": "logs",
- "notes": "[Optional] Required to create an instance of Cloud logs."
+ "notes": "[Optional] Required to create an instance of Cloud Logs."
},
{
- "service_name": "logs-router",
"role_crns": [
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
],
- "notes": "[Optional] Required to create an instance of Logs Routing."
+ "service_name": "logs-router",
+ "notes": "[Optional] Required for configuring cloud logs routing."
},
{
- "service_name": "atracker",
"role_crns": [
"crn:v1:bluemix:public:iam::::serviceRole:Writer",
"crn:v1:bluemix:public:iam::::role:Editor"
],
- "notes": "[Optional] Required when enabling the Activity Tracker Event Routing."
+ "service_name": "atracker",
+ "notes": "[Optional] Required to set up Activity Tracker event routing of auditing events."
+ },
+ {
+ "role_crns": [
+ "crn:v1:bluemix:public:iam::::serviceRole:Manager",
+ "crn:v1:bluemix:public:iam::::role:Editor"
+ ],
+ "service_name": "sysdig-secure",
+ "notes": "[Optional] Required for creating and managing SCC Workload Protection instance."
+ },
+ {
+ "role_crns": [
+ "crn:v1:bluemix:public:iam::::role:Administrator",
+ "crn:v1:bluemix:public:iam::::serviceRole:Manager"
+ ],
+ "service_name": "apprapp",
+ "notes": "[Optional] Required for provisioning the App Configuration instance."
},
{
- "service_name": "metrics-router",
"role_crns": [
"crn:v1:bluemix:public:iam::::role:Administrator"
],
+ "service_name": "metrics-router",
"notes": "[Optional] Required to enable metrics routing to the Cloud Monitoring."
},
{
@@ -225,7 +249,7 @@
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/refs/heads/main/reference-architecture/deployable-architecture-ocp-cluster.svg",
"type": "image/svg+xml"
},
- "description": "This architecture supports creation of Red Hat OpenShift cluster within a Virtual Private Cloud (VPC).
You can create a fully-configured VPC by selecting the [Cloud automation for VPC](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-vpc-2af61763-f8ef-4527-a815-b92166f29bc8-global) dependency or you can use an existing VPC if any. The VPC can be provisioned either in a single-zone or multi-zone configuration, depending on your availability requirements. By default, the VPC addon provisions a three-zone VPC, forming the foundation for your OpenShift cluster. This cluster includes a single worker pool distributed across all three zones, with two worker nodes per zone. If you need additional worker pools, you can easily configure them using the additional_worker_pools variable.
A Cloud Object Storage (COS) instance is required for this topology. Within this instance, an Object Storage bucket will be created, which serves as the internal registry storage for the OpenShift cluster. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) architecture supports the creation of COS instance. Additionally, Key Management Services(KMS) is used to encrypt the cluster and the boot volumes used by the cluster to enhance security.
For logging and monitoring needs, you can enable Observability for your cluster. [Cloud automation for Observability](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-observability-a3137d28-79e0-479d-8a24-758ebd5a0eab-global) provides advanced monitoring, logging, and operational insights into the performance and health of your deployment.
Secrets Manager Integration can also be enabled using [Cloud automation for Secrets Manager](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-secrets-manager-6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global) for centrally managing Ingress subdomain certificates, ensuring secure management of sensitive credentials.
This architecture provides a robust and secure foundation for deploying and managing your Red Hat OpenShift cluster, enabling seamless integration, enhanced security, and comprehensive monitoring for your cloud-native applications."
+ "description": "This architecture supports creation of Red Hat OpenShift cluster within a Virtual Private Cloud (VPC).
You can create a fully-configured VPC by selecting the [Cloud automation for VPC](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-vpc-2af61763-f8ef-4527-a815-b92166f29bc8-global) dependency or you can use an existing VPC if any. The VPC can be provisioned either in a single-zone or multi-zone configuration, depending on your availability requirements. By default, the VPC addon provisions a three-zone VPC, forming the foundation for your OpenShift cluster. This cluster includes a single worker pool distributed across all three zones, with two worker nodes per zone. If you need additional worker pools, you can easily configure them using the additional_worker_pools variable.
A Cloud Object Storage (COS) instance is required for this topology. Within this instance, an Object Storage bucket will be created, which serves as the internal registry storage for the OpenShift cluster. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) architecture supports the creation of COS instance. Additionally, Key Management Services(KMS) is used to encrypt the cluster and the boot volumes used by the cluster to enhance security. In addition, you have an option to integrate with Observability services such as [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) which provides robust monitoring capabilities and captures essential metrics such as CPU and memory utilization, helping you proactively monitor system performance and resource consumption, [Cloud automation for Activity Tracker Event Routing](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-activity-tracker-918453c3-4f97-4583-8c4a-83ef12fc7916-global) to monitor how users and applications interact with the cluster, supporting compliance and auditability, [Cloud automation for Cloud Logs](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-logs-63d8ae58-fbf3-41ce-b844-0fb5b85882ab-global) can be enabled to collect, view, and analyze platform logs related to the cluster and logs generated by applications deployed on the cluster.
Secrets Manager Integration can also be enabled using [Cloud automation for Secrets Manager](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-secrets-manager-6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global) for centrally managing Ingress subdomain certificates, ensuring secure management of sensitive credentials.
This architecture provides a robust and secure foundation for deploying and managing your Red Hat OpenShift cluster, enabling seamless integration, enhanced security, and comprehensive monitoring for your cloud-native applications."
}
]
},
@@ -523,8 +547,8 @@
},
{
"key": "enable_platform_metrics",
- "type": "string",
- "default_value": "true",
+ "type": "boolean",
+ "default_value": false,
"description": "When set to `true`, the IBM Cloud Monitoring instance will be configured to collect platform metrics from the provided region. ⚠️ You can configure 1 instance only of the IBM Cloud Monitoring service per region to collect platform metrics in that location. Check with the account or service administrator if another monitoring instance has already been configured. You may not have permissions to see all monitoring instances in the region. [Learn more](https://cloud.ibm.com/docs/monitoring?topic=monitoring-platform_metrics_enabling).",
"required": true,
"virtual": true,
@@ -541,8 +565,8 @@
},
{
"key": "logs_routing_tenant_regions",
- "type": "list(string)",
- "default_value": "[]",
+ "type": "array",
+ "default_value": [],
"description": "To manage platform logs that are generated by IBM Cloud services in a region of IBM Cloud, you must create a tenant in each region that you operate. Pass a list of regions to create a tenant in. For example: [\"us-south\", \"us-east\"]. [Learn more](https://cloud.ibm.com/docs/logs-router?topic=logs-router-about-platform-logs).",
"required": true,
"virtual": true,
@@ -907,14 +931,14 @@
],
"dependencies": [
{
- "name": "deploy-arch-ibm-vpc",
+ "name": "deploy-arch-ibm-slz-vpc",
"description": "Configure the VPC and subnets to deploy the OpenShift cluster.",
- "id": "2af61763-f8ef-4527-a815-b92166f29bc8-global",
- "version": "v7.24.0",
+ "id": "9fc0fa64-27af-4fed-9dce-47b3640ba739-global",
+ "version": "v8.2.1",
"flavors": [
"fully-configurable"
],
- "catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
+ "catalog_id": "1082e7d2-5e2f-0a11-a3bc-f88a8e1931fc",
"optional": false,
"on_by_default": true,
"input_mapping": [
@@ -923,11 +947,6 @@
"version_input": "prefix",
"reference_version": true
},
- {
- "dependency_input": "existing_resource_group_name",
- "version_input": "existing_resource_group_name",
- "reference_version": true
- },
{
"dependency_input": "region",
"version_input": "region",
@@ -978,7 +997,7 @@
"name": "deploy-arch-ibm-kms",
"description": "Enables managed encryption with your own keys via IBM Cloud Key Protect. If disabled, services will default to IBM-managed encryption.",
"id": "2cad4789-fa90-4886-9c9e-857081c273ee-global",
- "version": "v5.1.4",
+ "version": "v5.1.19",
"flavors": [
"fully-configurable"
],
@@ -995,13 +1014,13 @@
"version_input": "existing_kms_instance_crn"
},
{
- "dependency_input": "existing_resource_group_name",
- "version_input": "existing_resource_group_name",
+ "dependency_input": "prefix",
+ "version_input": "prefix",
"reference_version": true
},
{
- "dependency_input": "prefix",
- "version_input": "prefix",
+ "dependency_input": "region",
+ "version_input": "region",
"reference_version": true
}
]
@@ -1010,7 +1029,7 @@
"name": "deploy-arch-ibm-cos",
"description": "Sets up a Cloud Object Storage (COS) instance and bucket to serve as the internal registry storage for your OpenShift cluster.",
"id": "68921490-2778-4930-ac6d-bae7be6cd958-global",
- "version": "v9.0.2",
+ "version": "v10.2.1",
"flavors": [
"instance"
],
@@ -1022,25 +1041,59 @@
"dependency_output": "cos_instance_crn",
"version_input": "existing_cos_instance_crn"
},
+ {
+ "dependency_input": "prefix",
+ "version_input": "prefix",
+ "reference_version": true
+ }
+ ]
+ },
+ {
+ "name": "deploy-arch-ibm-cloud-logs",
+ "description": "Configure an IBM Cloud Logs instance to analyse the platform logs.",
+ "catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
+ "flavors": [
+ "fully-configurable"
+ ],
+ "id": "63d8ae58-fbf3-41ce-b844-0fb5b85882ab-global",
+ "version": "v1.6.11",
+ "optional": true,
+ "on_by_default": true,
+ "input_mapping": [
{
"dependency_input": "prefix",
"version_input": "prefix",
"reference_version": true
},
{
- "dependency_input": "existing_resource_group_name",
- "version_input": "existing_resource_group_name",
+ "dependency_input": "region",
+ "version_input": "region",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_cos_instance_crn",
+ "version_input": "existing_cos_instance_crn",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_kms_instance_crn",
+ "version_input": "existing_kms_instance_crn",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "logs_routing_tenant_regions",
+ "version_input": "logs_routing_tenant_regions",
"reference_version": true
}
]
},
{
- "name": "deploy-arch-ibm-observability",
- "description": "Sets up IBM Cloud Logs, Monitoring, and Activity Tracker routing to analyze metrics and logs from your OpenShift cluster.",
- "id": "a3137d28-79e0-479d-8a24-758ebd5a0eab-global",
- "version": "v3.0.3",
+ "name": "deploy-arch-ibm-cloud-monitoring",
+ "description": "Sets up a Cloud Monitoring instance to collect the platform metrics.",
+ "id": "73debdbf-894f-4c14-81c7-5ece3a70b67d-global",
+ "version": "v1.6.4",
"flavors": [
- "instances"
+ "fully-configurable"
],
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
"optional": true,
@@ -1051,14 +1104,58 @@
"version_input": "prefix",
"reference_version": true
},
+ {
+ "dependency_input": "region",
+ "version_input": "region",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_cos_instance_crn",
+ "version_input": "existing_cos_instance_crn",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_kms_instance_crn",
+ "version_input": "existing_kms_instance_crn",
+ "reference_version": true
+ },
{
"dependency_input": "enable_platform_metrics",
"version_input": "enable_platform_metrics",
"reference_version": true
+ }
+ ]
+ },
+ {
+ "name": "deploy-arch-ibm-activity-tracker",
+ "description": "Configure Activity Tracker Event Routing to route the auditing events.",
+ "id": "918453c3-4f97-4583-8c4a-83ef12fc7916-global",
+ "version": "v1.2.25",
+ "flavors": [
+ "fully-configurable"
+ ],
+ "catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
+ "optional": true,
+ "on_by_default": true,
+ "input_mapping": [
+ {
+ "dependency_input": "prefix",
+ "version_input": "prefix",
+ "reference_version": true
},
{
- "dependency_input": "logs_routing_tenant_regions",
- "version_input": "logs_routing_tenant_regions",
+ "dependency_input": "region",
+ "version_input": "region",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_cos_instance_crn",
+ "version_input": "existing_cos_instance_crn",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "existing_kms_instance_crn",
+ "version_input": "existing_kms_instance_crn",
"reference_version": true
}
]
@@ -1067,7 +1164,7 @@
"name": "deploy-arch-ibm-secrets-manager",
"description": "Provisions a Secrets Manager instance to centrally manage Ingress subdomain certificates and other sensitive credentials.",
"id": "6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global",
- "version": "v2.4.0",
+ "version": "v2.8.6",
"flavors": [
"fully-configurable"
],
@@ -1080,6 +1177,11 @@
"version_input": "prefix",
"reference_version": true
},
+ {
+ "dependency_input": "region",
+ "version_input": "region",
+ "reference_version": true
+ },
{
"dependency_input": "service_plan",
"version_input": "secrets_manager_service_plan",
@@ -1090,11 +1192,6 @@
"version_input": "secrets_manager_endpoint_type",
"reference_version": true
},
- {
- "dependency_input": "existing_resource_group_name",
- "version_input": "existing_resource_group_name",
- "reference_version": true
- },
{
"dependency_output": "secrets_manager_crn",
"version_input": "existing_secrets_manager_instance_crn"
@@ -1104,6 +1201,30 @@
"value": true
}
]
+ },
+ {
+ "name": "deploy-arch-ibm-scc-workload-protection",
+ "description": "Configure an IBM Cloud Security and Compliance Center Workload Protection instance to help you manage security and compliance for your organization.",
+ "id": "4322cf44-2289-49aa-a719-dd79e39b14dc-global",
+ "version": "v1.11.4",
+ "flavors": [
+ "fully-configurable"
+ ],
+ "catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
+ "optional": true,
+ "on_by_default": true,
+ "input_mapping": [
+ {
+ "dependency_input": "prefix",
+ "version_input": "prefix",
+ "reference_version": true
+ },
+ {
+ "dependency_input": "region",
+ "version_input": "region",
+ "reference_version": true
+ }
+ ]
}
],
"dependency_version_2": true,
diff --git a/reference-architecture/deployable-architecture-ocp-cluster-qs.svg b/reference-architecture/deployable-architecture-ocp-cluster-qs.svg
index bdd6901b..15949a10 100644
--- a/reference-architecture/deployable-architecture-ocp-cluster-qs.svg
+++ b/reference-architecture/deployable-architecture-ocp-cluster-qs.svg
@@ -1,4 +1,4 @@
-
\ No newline at end of file
+
ACL
locked
IBM Cloud
Region
Resource GroupVPC
Worker node
OpenShift
Zone 3
Zone 2
Zone 1
Subnet
Worker Node
Worker Pool
Zone 3
Zone 2
Zone 1
Subnet
Worker Node
Worker Pool
Registry Bucket
Object Storage
\ No newline at end of file
diff --git a/reference-architecture/deployable-architecture-ocp-cluster.svg b/reference-architecture/deployable-architecture-ocp-cluster.svg
index 0ec70c90..a4ee6389 100644
--- a/reference-architecture/deployable-architecture-ocp-cluster.svg
+++ b/reference-architecture/deployable-architecture-ocp-cluster.svg
@@ -1,4 +1,4 @@
-
ACL
locked
IBM Cloud
Region
Cloud Logs
Observability
[Optional]
Cloud MonitoringRegistry Bucket
[Optional] Object Storage
[Optional] Key Protect
Key Ring
Encryption Keys
Worker Node
VPC
Zone 3
Zone 2
OpenShift
Zone 1
Worker Pool
Worker Node
Worker Node
Resource GroupActivity Tracker Event Routing Event NotificationsSecrets Manager
\ No newline at end of file
+