diff --git a/ibm_catalog.json b/ibm_catalog.json index 0e85fd5d..5d8a78ee 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -528,6 +528,7 @@ "description": "When set to `true`, the IBM Cloud Monitoring instance will be configured to collect platform metrics from the provided region. ⚠️ You can configure 1 instance only of the IBM Cloud Monitoring service per region to collect platform metrics in that location. Check with the account or service administrator if another monitoring instance has already been configured. You may not have permissions to see all monitoring instances in the region. [Learn more](https://cloud.ibm.com/docs/monitoring?topic=monitoring-platform_metrics_enabling).", "required": true, "virtual": true, + "hidden": true, "options": [ { "displayname": "true", @@ -546,6 +547,7 @@ "description": "To manage platform logs that are generated by IBM Cloud services in a region of IBM Cloud, you must create a tenant in each region that you operate. Pass a list of regions to create a tenant in. For example: [\"us-south\", \"us-east\"]. [Learn more](https://cloud.ibm.com/docs/logs-router?topic=logs-router-about-platform-logs).", "required": true, "virtual": true, + "hidden": true, "custom_config": { "grouping": "deployment", "original_grouping": "deployment", @@ -616,10 +618,12 @@ ] }, { - "key": "enable_ocp_console" + "key": "enable_ocp_console", + "hidden": true }, { "key": "addons", + "hidden": true, "custom_config": { "type": "code_editor", "grouping": "deployment", @@ -633,6 +637,7 @@ { "key": "additional_worker_pools", "type": "array", + "hidden": true, "custom_config": { "type": "code_editor", "grouping": "deployment", @@ -658,6 +663,7 @@ }, { "key": "default_worker_pool_labels", + "hidden": true, "custom_config": { "type": "code_editor", "grouping": "deployment", @@ -669,13 +675,16 @@ "hidden": true }, { - "key": "default_pool_minimum_number_of_nodes" + "key": "default_pool_minimum_number_of_nodes", + "hidden": true }, { - "key": "default_pool_maximum_number_of_nodes" + "key": "default_pool_maximum_number_of_nodes", + "hidden": true }, { "key": "additional_security_group_ids", + "hidden": true, "custom_config": { "type": "array", "grouping": "deployment", @@ -690,7 +699,8 @@ "hidden": true }, { - "key": "use_private_endpoint" + "key": "use_private_endpoint", + "hidden": true }, { "key": "cluster_config_endpoint_type", @@ -731,6 +741,7 @@ }, { "key": "custom_security_group_ids", + "hidden": true, "custom_config": { "type": "array", "grouping": "deployment", @@ -746,6 +757,7 @@ }, { "key": "additional_lb_security_group_ids", + "hidden": true, "description": "A list of additional security group IDs to be attached to the load balancers associated with the cluster. These groups are applied in addition to the default IBM-managed security group." }, { @@ -754,6 +766,7 @@ }, { "key": "additional_vpe_security_group_ids", + "hidden": true, "custom_config": { "type": "code_editor", "grouping": "deployment", @@ -761,10 +774,12 @@ } }, { - "key": "ibmcloud_kms_api_key" + "key": "ibmcloud_kms_api_key", + "hidden": true }, { - "key": "kms_encryption_enabled_cluster" + "key": "kms_encryption_enabled_cluster", + "hidden": true }, { "key": "existing_kms_instance_crn", @@ -774,10 +789,12 @@ "description": "The value provided for 'existing_kms_instance_crn' is not valid.", "value": "^__NULL__$|^crn:(.*:){3}(kms|hs-crypto):(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" } - ] + ], + "hidden": true }, { "key": "existing_cluster_kms_key_crn", + "hidden": true, "value_constraints": [ { "type": "regex", @@ -801,16 +818,20 @@ "hidden": true }, { - "key": "cluster_kms_key_name" + "key": "cluster_kms_key_name", + "hidden": true }, { - "key": "cluster_kms_key_ring_name" + "key": "cluster_kms_key_ring_name", + "hidden": true }, { - "key": "kms_encryption_enabled_boot_volume" + "key": "kms_encryption_enabled_boot_volume", + "hidden": true }, { "key": "existing_boot_volume_kms_key_crn", + "hidden": true, "value_constraints": [ { "type": "regex", @@ -839,7 +860,8 @@ } }, { - "key": "enable_secrets_manager_integration" + "key": "enable_secrets_manager_integration", + "hidden": true }, { "key": "existing_secrets_manager_instance_crn", @@ -849,10 +871,12 @@ "description": "The value provided for 'existing_secrets_manager_instance_crn' is not valid.", "value": "^__NULL__$|^crn:(.*:){3}secrets-manager:(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" } - ] + ], + "hidden": true }, { "key": "secrets_manager_secret_group_id", + "hidden": true, "value_constraints": [ { "type": "regex", @@ -906,7 +930,8 @@ ] }, { - "key": "skip_ocp_secrets_manager_iam_auth_policy" + "key": "skip_ocp_secrets_manager_iam_auth_policy", + "hidden": true }, { "key": "subnets", @@ -914,6 +939,7 @@ "description": "List of subnets for the vpc. For each item in each array, a subnet will be created. Items can be either CIDR blocks or total ipv4 addresses. Public gateways will be enabled only in zones where a gateway has been created. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone-vpc/blob/main/solutions/fully-configurable/DA-types.md#subnets-).", "required": false, "virtual": true, + "hidden": true, "custom_config": { "grouping": "deployment", "original_grouping": "deployment", @@ -927,6 +953,7 @@ "description": "The list of ACLs to create. Provide at least one rule for each ACL. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone-vpc/blob/main/solutions/fully-configurable/DA-types.md#network-acls-).", "required": false, "virtual": true, + "hidden": true, "custom_config": { "type": "code_editor", "grouping": "deployment", @@ -952,7 +979,8 @@ "hidden": true }, { - "key": "enable_kube_audit" + "key": "enable_kube_audit", + "hidden": true }, { "key": "audit_deployment_name", diff --git a/solutions/fully-configurable/variables.tf b/solutions/fully-configurable/variables.tf index e7d5a7e6..d0f28cbe 100644 --- a/solutions/fully-configurable/variables.tf +++ b/solutions/fully-configurable/variables.tf @@ -269,13 +269,13 @@ variable "use_private_endpoint" { variable "allow_public_access_to_cluster_management" { type = bool description = "Set to true to access the cluster through a public cloud service endpoint. [Learn More](https://cloud.ibm.com/docs/openshift?topic=openshift-access_cluster)." - default = false + default = true } variable "allow_outbound_traffic" { type = bool description = "Set to true to allow public outbound access from the cluster workers." - default = false + default = true } variable "cluster_config_endpoint_type" {