You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/fscloud/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,12 +4,12 @@ This example demonstrates how to use the [fscloud profile](../../profiles/fsclou
4
4
5
5
This examples is designed to show case some of the key customization options for the module. In addition to the pre-wired CBR rules documented at [fscloud profile](../../profiles/fscloud/), this example shows how to customize the module to:
6
6
1. Open up network traffic flow from Schematics to Key Protect and HPCS public endpoints. Note that for illustration purpose, this example configures the use of both Key Protect and HPCS through the `kms_service_targeted_by_prewired_rules` variable. In a real-world scenario, only one Key Management Service would be used
7
-
2. Open up network traffic flow from a block of IPs to the Schematics public endpoint.
7
+
2. Open up network traffic flow from a block of IPs to the Schematics public endpoint and the private container clusters endpoints.
8
8
3. Open up network traffic flow from the VPC created in this example to ICD postgresql private endpoints.
9
9
10
10
Context: this examples covers a "pseudo" real-world scenario where:
11
11
1. Schematics is used to execute terraform that create Key Protect, and HPCS keys and key ring over its public endpoint.
12
-
2. Operators use machines with a set list of public IPs to interact with Schematics.
12
+
2. Operators use machines with a set list of public IPs to interact with Schematics, and through private endpoints to the container clusters.
13
13
3. Applications are running the VPC and need access to PostgreSQL via the private endpoint - eg: a VPE.
14
14
4. Skips creation of zones for these two service references ["user-management", "iam-groups"].
Copy file name to clipboardExpand all lines: modules/fscloud/README.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,22 @@
1
1
# Pre-wired CBR configuration for FS Cloud
2
2
3
3
This module creates default coarse-grained CBR rules in a given account following a "secure by default" approach - that is: deny all flows by default, except known documented communication in the [Financial Services Cloud Reference Architecture](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-about):
4
-
- COS -> KMS
5
-
- Block storage -> KMS
6
-
- ROKS -> KMS
7
-
- All ICD services -> KMS
8
-
- Activity Tracker route -> COS
9
-
- VPCs where clusters are deployed -> COS
10
-
- IS (VPC Infrastructure Services) -> COS
11
-
- VPCs -> container registry
12
-
- All ICD -> HPCS
13
-
- IKS -> IS (VPC Infrastructure Services)
4
+
- Cloud Object Storage (COS) -> Key Management Service (KMS)
5
+
- Block Storage -> Key Management Service (KMS)
6
+
- IBM Cloud Kubernetes Service (IKS) -> Key Management Service (KMS)
7
+
- All IBM Cloud Databases (ICD) services -> Key Management Service (KMS)
- IBM Cloud Kubernetes Service (IKS) -> IS (VPC Infrastructure Services)
14
+
14
15
15
16
**Note on KMS**: the module supports setting up rules for Key Protect, and Hyper Protect Crypto Services. By default the modules set rules for Hyper Protect Crypto Services, but this can be modified to use Key Protect, Hyper Protect, or both Key Protect and Hyper Protect Crypto Services using the input variable `kms_service_targeted_by_prewired_rules`.
16
17
18
+
**Note on containers-kubernetes**: the module supports the pseudo-service names `containers-kubernetes-management` and `containers-kubernetes-cluster` to distinguish between the cluster and management APIs (see [details](https://cloud.ibm.com/docs/containers?topic=containers-cbr&interface=ui#protect-api-types-cbr) ). The module creates separates CBR rules for the two types of APIs by default to align with common real-world scenarios. `containers-kubernetes` can be used to create a CBR targetting both the cluster and management APIs.
19
+
17
20
This module is designed to allow the consumer to add additional custom rules to open up additional flows necessarity for their usage. See the `custom_rule_contexts_by_service` input variable, and an [usage example](../../examples/fscloud/) demonstrating how to open up more flows.
18
21
19
22
The module also pre-create CBR zone for each service in the account as a best practice. CBR rules associated with these CBR zone can be set by using the `custom_rule_contexts_by_service` variable.
0 commit comments