Skip to content

Commit a9da081

Browse files
authored
feat: updated fscloud submodule to support required flows for SCC Workload Protection service (#691)
1 parent 984a724 commit a9da081

File tree

5 files changed

+158
-71
lines changed

5 files changed

+158
-71
lines changed

examples/fscloud/main.tf

Lines changed: 31 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,30 +78,30 @@ module "cbr_account_level" {
7878
"kms" = {
7979
# Demonstrates how a customized CBR description (also seen as being the rule name) can be set
8080
"description" = "kms-rule-example-of-customized-description"
81-
"enforcement_mode" = "enabled"
81+
"enforcement_mode" = "report"
8282
"instance_id" = module.key_protect_module.key_protect_guid
8383
"target_rg" = module.resource_group.resource_group_id
8484
"global_deny" = false # opting out from creating a new global rule
8585
}
8686
"cloud-object-storage" = {
87-
"enforcement_mode" = "enabled"
87+
"enforcement_mode" = "report"
8888
"global_deny" = false # mandatory to set 'global_deny = false' when no scope is defined
8989
}
9090
"databases-for-postgresql" = {
91-
"enforcement_mode" = "enabled"
91+
"enforcement_mode" = "disabled" # Report-only is not available for Cloud Databases.
9292
"target_rg" = module.resource_group.resource_group_id
9393
}
9494
"messagehub" = {
9595
# As the service is scoped, a new global rule will also get created
96-
"enforcement_mode" = "enabled"
96+
"enforcement_mode" = "report"
9797
"target_rg" = module.resource_group.resource_group_id
9898
}
9999
"IAM" : {
100100
"enforcement_mode" = "report"
101101
"global_deny" = false
102102
}
103103
"container-registry" : {
104-
"enforcement_mode" : "enabled"
104+
"enforcement_mode" : "report"
105105
"geography" : "global"
106106
}
107107
}
@@ -118,6 +118,9 @@ module "cbr_account_level" {
118118
cloud-object-storage = {
119119
zone_name = "${var.prefix}-COS-zone-example-of-customized-zone-name"
120120
}
121+
event-notifications = {
122+
zone_name = "${var.prefix}-event-notifications-zone"
123+
},
121124
}
122125

123126
# Demonstrates how additional context to the rules created by this module can be added.
@@ -149,6 +152,29 @@ module "cbr_account_level" {
149152
zone_ids = [module.cbr_zone_operator_ips.zone_id]
150153
}]
151154
})
155+
156+
# The full list of services can be found here- https://cloud.ibm.com/docs/app-configuration?topic=app-configuration-ac-configuration-aggregator#ac-list-of-services-configaggregator
157+
appconfig_aggregator_service_access = {
158+
cloud-object-storage = true # Enable flow from App Configuration -> Cloud Object Storage
159+
is = false
160+
secrets-manager = false
161+
IAM = true # Enable flow from App Configuration -> All IAM Account Management services
162+
kms = true # Enable flow from App Configuration -> Key Protect
163+
container-registry = false
164+
codeengine = false
165+
dns-svcs = true # Enable flow from App Configuration -> DNS services
166+
messagehub = false
167+
transit = false
168+
schematics = false
169+
sysdig-monitor = false
170+
sysdig-secure = false
171+
hs-crypto = false
172+
apprapp = false
173+
globalcatalog-collection = false
174+
event-notifications = false
175+
atracker = false
176+
logs = true # Enable flow from App Configuration -> Cloud Logs
177+
}
152178
}
153179

154180
## Example of zone using ip addresses, and reference in one of the zone created by the cbr_account_level above.

0 commit comments

Comments
 (0)