You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/fscloud/README.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,16 @@
2
2
3
3
This example demonstrates how to use the [fscloud profile](../../profiles/fscloud/) module to lay out a complete "secure by default" coarse-grained CBR topology in a given account.
4
4
5
-
This examples is designed to show case some of the key customization options for the module. In addition to the pre-wired CBR rules documented at [fscloud profile](../../profiles/fscloud/), this examples show how to customize the module to:
6
-
1. Open up network traffic flow from ICD mongodb, ICD Postgresql to the Key Protect private endpoints.
7
-
2. Open up network traffic flow from Schematics to Key Protect public endpoints.
8
-
3. Open up network traffic flow from a block of IPs to the Schematics public endpoint.
9
-
4. Open up network traffic flow from the VPC created in this example to ICD postgresql private endpoints.
5
+
This examples is designed to show case some of the key customization options for the module. In addition to the pre-wired CBR rules documented at [fscloud profile](../../profiles/fscloud/), this example shows how to customize the module to:
6
+
1. Open up network traffic flow from Schematics to Key Protect and HPCS public endpoints. Note that for illustration purpose, this example configures the use of both Key Protect and HPCS through the `kms_service_targeted_by_prewired_rules` variable. In a real-world scenario, only one Key Management Service would be used
7
+
2. Open up network traffic flow from a block of IPs to the Schematics public endpoint.
8
+
3. Open up network traffic flow from the VPC created in this example to ICD postgresql private endpoints.
10
9
11
10
Context: this examples covers a "pseudo" real-world scenario where:
12
-
1. ICD Mongodb and Postgresql instances are encrypted using keys storage in Key Protect.
13
-
2. Schematics is used to execute terraform that create Key Protect keys and key ring over its public endpoint.
14
-
3. Operators use machines with a set list of public IPs to interact with Schematics.
15
-
4. Applications are running the VPC and need access to PostgreSQL via the private endpoint - eg: a VPE.
16
-
5. Skips creation of zones for these two service references ["user-management", "iam-groups"].
11
+
1. Schematics is used to execute terraform that create Key Protect, and HPCS keys and key ring over its public endpoint.
12
+
2. Operators use machines with a set list of public IPs to interact with Schematics.
13
+
3. Applications are running the VPC and need access to PostgreSQL via the private endpoint - eg: a VPE.
14
+
4. Skips creation of zones for these two service references ["user-management", "iam-groups"].
17
15
18
16
## Note
19
17
- The services 'compliance', 'directlink', 'iam-groups', 'containers-kubernetes', 'user-management' do not support restriction per location for zone creation.
Copy file name to clipboardExpand all lines: modules/fscloud/README.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,16 @@ This module creates default coarse-grained CBR rules in a given account followin
4
4
- COS -> KMS
5
5
- Block storage -> KMS
6
6
- ROKS -> KMS
7
+
- All ICD services -> KMS
7
8
- Activity Tracker route -> COS
8
9
- VPCs where clusters are deployed -> COS
9
10
- IS (VPC Infrastructure Services) -> COS
10
11
- VPCs -> container registry
11
-
- All ICD -> KMS
12
+
- All ICD -> HPCS
12
13
- IKS -> IS (VPC Infrastructure Services)
13
14
15
+
**Note on KMS**: the module supports setting up rules for Key Protect, and Hyper Protect Crypto Services. By default the modules set rules for Hyper Protect Crypto Services, but this can be modified to use Key Protect, Hyper Protect, or both Key Protect and Hyper Protect Crypto Services using the input variable `kms_service_targeted_by_prewired_rules`.
16
+
14
17
This module is designed to allow the consumer to add additional custom rules to open up additional flows necessarity for their usage. See the `custom_rule_contexts_by_service` input variable, and an [usage example](../../examples/fscloud/) demonstrating how to open up more flows.
15
18
16
19
The module also pre-create CBR zone for each service in the account as a best practice. CBR rules associated with these CBR zone can be set by using the `custom_rule_contexts_by_service` variable.
@@ -95,6 +98,7 @@ module "cbr_fscloud" {
95
98
| <aname="input_custom_rule_contexts_by_service"></a> [custom\_rule\_contexts\_by\_service](#input\_custom\_rule\_contexts\_by\_service)| Any additional context to add to the CBR rules created by this module. The context are added to the CBR rule targetting the service passed as a key. The module looks up the zone id when service\_ref\_names or add\_managed\_vpc\_zone are passed in. | <pre>map(list(object(<br> {<br> endpointType = string # "private, public or direct"<br><br> # Service-name (module lookup for existing network zone) and/or CBR zone id<br> service_ref_names = optional(list(string), [])<br> add_managed_vpc_zone = optional(bool, false)<br> zone_ids = optional(list(string), [])<br> })))</pre> |`{}`| no |
96
99
| <aname="input_existing_cbr_zone_vpcs"></a> [existing\_cbr\_zone\_vpcs](#input\_existing\_cbr\_zone\_vpcs)| Provide a existing zone id for VPC | <pre>object(<br> {<br> zone_id = string<br> })</pre> |`null`| no |
97
100
| <aname="input_existing_serviceref_zone"></a> [existing\_serviceref\_zone](#input\_existing\_serviceref\_zone)| Provide a valid service reference and existing zone id | <pre>map(object(<br> {<br> zone_id = string<br> }))</pre> |`{}`| no |
101
+
| <aname="input_kms_service_targeted_by_prewired_rules"></a> [kms\_service\_targeted\_by\_prewired\_rules](#input\_kms\_service\_targeted\_by\_prewired\_rules)| IBM Cloud offers two distinct Key Management Services (KMS): Key Protect and Hyper Protect Crypto Services (HPCS). This variable determines the specific KMS service to which the pre-configured rules will be applied. Use the value 'key-protect' to specify the Key Protect service, and 'hs-crypto' for the Hyper Protect Crypto Services (HPCS). |`list(string)`| <pre>[<br> "hs-crypto"<br>]</pre> | no |
98
102
| <aname="input_location"></a> [location](#input\_location)| The region in which the network zone is scoped |`string`|`null`| no |
99
103
| <aname="input_prefix"></a> [prefix](#input\_prefix)| Prefix to append to all vpc\_zone\_list, service\_ref\_zone\_list and cbr\_rule\_description created by this submodule |`string`| n/a | yes |
100
104
| <aname="input_skip_specific_services_for_zone_creation"></a> [skip\_specific\_services\_for\_zone\_creation](#input\_skip\_specific\_services\_for\_zone\_creation)| Provide a list of service references for which zone creation is not required |`list(string)`|`[]`| no |
description ="IBM Cloud offers two distinct Key Management Services (KMS): Key Protect and Hyper Protect Crypto Services (HPCS). This variable determines the specific KMS service to which the pre-configured rules will be applied. Use the value 'key-protect' to specify the Key Protect service, and 'hs-crypto' for the Hyper Protect Crypto Services (HPCS)."
0 commit comments