You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description="Allow all Elastic Search instances in the resource group ${module.resource_group.resource_group_id} in the account ${data.ibm_iam_account_settings.iam_account_settings[0].account_id} to read from the ${local.kms_service_name} instance GUID ${local.existing_kms_instance_guid}"
49
+
}
50
+
51
+
# workaround for https://github.com/IBM-Cloud/terraform-provider-ibm/issues/4478
Copy file name to clipboardExpand all lines: solutions/standard/variables.tf
+9-2Lines changed: 9 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -117,6 +117,13 @@ variable "tags" {
117
117
default=[]
118
118
}
119
119
120
+
variable"ibmcloud_kms_api_key" {
121
+
type=string
122
+
description="The IBM Cloud API key that can create a root key and key ring in the key management service (KMS) instance. If not specified, the 'ibmcloud_api_key' variable is used. Specify this key if the instance in `existing_kms_instance_crn` is in an account that's different from the Elastic Search instance. Leave this input empty if the same account owns both instances."
123
+
sensitive=true
124
+
default=null
125
+
}
126
+
120
127
variable"kms_endpoint_type" {
121
128
type=string
122
129
description="The type of endpoint to use to communicate with the KMS instance. Possible values: `public`, `private`."
description="The CRN of a Hyper Protect Crypto Services or Key Protect instance in the same account as the Databases for Elasticsearch instance. This value is used to create an authorization policy if `skip_iam_authorization_policy` is false. If not specified, a root key is created."
144
+
description="The CRN of the KMS instance (Hyper Protect Crypto Services or Key Protect). Required only if `existing_kms_key_crn` is not specified. If the KMS instanceis in different account you must also provide a value for `ibmcloud_kms_api_key`."
138
145
type=string
139
146
default=null
140
147
}
141
148
142
149
variable"skip_iam_authorization_policy" {
143
150
type=bool
144
-
description="Whether to create an IAM authorization policy that permits all Databases for Elasticsearch instances in the resource group to read the encryption key from the Hyper Protect Crypto Services instance specified in the `existing_kms_instance_crn` variable."
151
+
description="Set to true to skip the creation of an IAM authorization policy that permits all Elastic Search instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_crn` variable. If a value is specified for `ibmcloud_kms_api_key`, the policy is created in the KMS account."
0 commit comments