You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/fscloud/README.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,16 +2,19 @@
2
2
3
3
This example demonstrates how to use the [fscloud profile](../../profiles/fscloud/) module to lay out a complete "secure by default" coarse-grained CBR topology in a given account.
4
4
5
-
This examples is designed to show case some of the key customization options for the module. In addition to the pre-wired CBR rules documented at [fscloud profile](../../profiles/fscloud/), this example shows how to customize the module to:
6
-
1. Open up network traffic flow from Schematics to Key Protect and HPCS public endpoints. Note that for illustration purpose, this example configures the use of both Key Protect and HPCS through the `kms_service_targeted_by_prewired_rules` variable. In a real-world scenario, only one Key Management Service would be used
7
-
2. Open up network traffic flow from a block of IPs to the Schematics public endpoint and the private container clusters endpoints.
8
-
3. Open up network traffic flow from the VPC created in this example to ICD postgresql private endpoints.
5
+
This examples is designed to show case some of the key customization options for the module. In addition to the pre-wired CBR rules documented at [fscloud profile](../../profiles/fscloud/), this examples show how to customize the module to:
6
+
1. Open up network traffic flow from ICD mongodb, ICD Postgresql to the Key Protect private endpoints.
7
+
2. Open up network traffic flow from Schematics to Key Protect public endpoints.
8
+
3. Open up network traffic flow from a block of IPs to the Schematics public endpoint.
9
+
4. Open up network traffic flow from the VPC created in this example to ICD postgresql private endpoints.
10
+
5. Customize the rule description for `kms` and the zone name for `codeengine`.
9
11
10
12
Context: this examples covers a "pseudo" real-world scenario where:
11
-
1. Schematics is used to execute terraform that create Key Protect, and HPCS keys and key ring over its public endpoint.
12
-
2. Operators use machines with a set list of public IPs to interact with Schematics, and through private endpoints to the container clusters.
13
-
3. Applications are running the VPC and need access to PostgreSQL via the private endpoint - eg: a VPE.
14
-
4. Skips creation of zones for these two service references ["user-management", "iam-groups"].
13
+
1. ICD Mongodb and Postgresql instances are encrypted using keys storage in Key Protect.
14
+
2. Schematics is used to execute terraform that create Key Protect keys and key ring over its public endpoint.
15
+
3. Operators use machines with a set list of public IPs to interact with Schematics.
16
+
4. Applications are running the VPC and need access to PostgreSQL via the private endpoint - eg: a VPE.
17
+
5. Skips creation of zones for these two service references ["user-management", "iam-groups"].
15
18
16
19
## Note
17
20
- The services 'compliance', 'directlink', 'iam-groups', 'containers-kubernetes', 'user-management' do not support restriction per location for zone creation.
Copy file name to clipboardExpand all lines: modules/fscloud/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,8 +105,8 @@ module "cbr_fscloud" {
105
105
| <aname="input_location"></a> [location](#input\_location)| The region in which the network zone is scoped |`string`|`null`| no |
106
106
| <aname="input_prefix"></a> [prefix](#input\_prefix)| Prefix to append to all vpc\_zone\_list, service\_ref\_zone\_list and cbr\_rule\_description created by this submodule |`string`| n/a | yes |
107
107
| <aname="input_skip_specific_services_for_zone_creation"></a> [skip\_specific\_services\_for\_zone\_creation](#input\_skip\_specific\_services\_for\_zone\_creation)| Provide a list of service references for which zone creation is not required |`list(string)`|`[]`| no |
108
-
| <aname="input_target_service_details"></a> [target\_service\_details](#input\_target\_service\_details)| Details of the target service for which a rule is created. The key is the service name. | <pre>map(object({<br> target_rg = optional(string)<br> instance_id = optional(string)<br> enforcement_mode = string<br> tags = optional(list(string))<br> }))</pre> |`{}`| no |
109
-
| <aname="input_zone_service_ref_list"></a> [zone\_service\_ref\_list](#input\_zone\_service\_ref\_list)| (List) Service reference for the zone creation |`list(string)`| <pre>[<br> "cloud-object-storage",<br> "codeengine",<br> "containers-kubernetes",<br> "databases-for-cassandra",<br> "databases-for-elasticsearch",<br> "databases-for-enterprisedb",<br> "databases-for-etcd",<br> "databases-for-mongodb",<br> "databases-for-mysql",<br> "databases-for-postgresql",<br> "databases-for-redis",<br> "directlink",<br> "iam-groups",<br> "is",<br> "messagehub",<br> "messages-for-rabbitmq",<br> "schematics",<br> "secrets-manager",<br> "server-protect",<br> "user-management",<br> "apprapp",<br> "compliance",<br> "event-notifications",<br> "logdna",<br> "logdnaat"<br>]</pre> | no |
108
+
| <aname="input_target_service_details"></a> [target\_service\_details](#input\_target\_service\_details)| Details of the target service for which a rule is created. The key is the service name. | <pre>map(object({<br> description = optional(string)<br> target_rg = optional(string)<br> instance_id = optional(string)<br> enforcement_mode = string<br> tags = optional(list(string))<br> }))</pre> |`{}`| no |
109
+
| <a name="input_zone_service_ref_list"></a> [zone\_service\_ref\_list](#input\_zone\_service\_ref\_list) | (Optional) Customized name of the zone for the service reference. If not provided, default zone name with the prefix will be created. | <pre>object({<br> cloud-object-storage = optional(string)<br> codeengine = optional(string)<br> containers-kubernetes = optional(string)<br> databases-for-cassandra = optional(string)<br> databases-for-elasticsearch = optional(string)<br> databases-for-enterprisedb = optional(string)<br> databases-for-etcd = optional(string)<br> databases-for-mongodb = optional(string)<br> databases-for-mysql = optional(string)<br> databases-for-postgresql = optional(string)<br> databases-for-redis = optional(string)<br> directlink = optional(string)<br> iam-groups = optional(string)<br> is = optional(string)<br> messagehub = optional(string)<br> messages-for-rabbitmq = optional(string)<br> schematics = optional(string)<br> secrets-manager = optional(string)<br> server-protect = optional(string)<br> user-management = optional(string)<br> apprapp = optional(string)<br> compliance = optional(string)<br> event-notifications = optional(string)<br> logdna = optional(string)<br> logdnaat = optional(string)<br> })</pre> | <pre>{<br> "apprapp": null,<br> "cloud-object-storage": null,<br> "codeengine": null,<br> "compliance": null,<br> "containers-kubernetes": null,<br> "databases-for-cassandra": null,<br> "databases-for-elasticsearch": null,<br> "databases-for-enterprisedb": null,<br> "databases-for-etcd": null,<br> "databases-for-mongodb": null,<br> "databases-for-mysql": null,<br> "databases-for-postgresql": null,<br> "databases-for-redis": null,<br> "directlink": null,<br> "event-notifications": null,<br> "iam-groups": null,<br> "is": null,<br> "logdna": null,<br> "logdnaat": null,<br> "messagehub": null,<br> "messages-for-rabbitmq": null,<br> "schematics": null,<br> "secrets-manager": null,<br> "server-protect": null,<br> "user-management": null<br>}</pre> | no |
110
110
| <aname="input_zone_vpc_crn_list"></a> [zone\_vpc\_crn\_list](#input\_zone\_vpc\_crn\_list)| (List) VPC CRN for the zones |`list(string)`| n/a | yes |
0 commit comments