Skip to content

Commit 613facc

Browse files
Jordan-Williams2Jordan-Williams2
authored andcommitted
fix: id instead of crn
1 parent cc7988c commit 613facc

File tree

2 files changed

+14
-29
lines changed

2 files changed

+14
-29
lines changed

modules/fscloud/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ module "elasticsearch" {
1111
name = var.name
1212
region = var.region
1313
skip_iam_authorization_policy = var.skip_iam_authorization_policy
14-
service_endpoints = "public"
14+
service_endpoints = "private"
1515
elasticsearch_version = var.elasticsearch_version
1616
kms_encryption_enabled = !var.use_ibm_owned_encryption_key
1717
existing_kms_instance_guid = var.existing_kms_instance_guid

solutions/standard/variables.tf

Lines changed: 13 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ variable "ibmcloud_kms_api_key" {
1818
variable "provider_visibility" {
1919
description = "Set the visibility value for the IBM terraform provider. Supported values are `public`, `private`, `public-and-private`. [Learn more](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/guides/custom-service-endpoints)."
2020
type = string
21-
default = "public"
21+
default = "private"
2222

2323
validation {
2424
condition = contains(["public", "private", "public-and-private"], var.provider_visibility)
@@ -29,7 +29,7 @@ variable "provider_visibility" {
2929
variable "prefix" {
3030
type = string
3131
description = "Prefix to add to all resources created by this solution."
32-
default = "test-es"
32+
default = null
3333
}
3434

3535
##############################################################################
@@ -39,7 +39,6 @@ variable "prefix" {
3939
variable "resource_group_name" {
4040
type = string
4141
description = "The name of a new or an existing resource group to provision the Databases for Elasicsearch in. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
42-
default = "test-es"
4342
}
4443

4544
variable "use_existing_resource_group" {
@@ -163,7 +162,7 @@ variable "users" {
163162
variable "service_credential_names" {
164163
type = map(string)
165164
description = "The map of name and role for service credentials that you want to create for the database. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-icd-elasticsearch/tree/main/solutions/standard/DA-types.md)."
166-
default = { "admin_test" : "Administrator", "editor_test" : "Editor" }
165+
default = {}
167166
}
168167

169168
variable "tags" {
@@ -228,7 +227,7 @@ variable "skip_iam_authorization_policy" {
228227
variable "kms_endpoint_type" {
229228
type = string
230229
description = "The type of endpoint to use to communicate with the KMS instance. Possible values: `public`, `private`."
231-
default = "public"
230+
default = "private"
232231
validation {
233232
condition = can(regex("public|private", var.kms_endpoint_type))
234233
error_message = "The kms_endpoint_type value must be 'public' or 'private'."
@@ -238,7 +237,7 @@ variable "kms_endpoint_type" {
238237
variable "existing_kms_instance_crn" {
239238
type = string
240239
description = "The CRN of an Hyper Protect Crypto Services or Key Protect instance that you want to use for both disk and backup encryption. Backup encryption is only supported is some regions ([learn more](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok)), so if you need to use a different instance for backup encryption from a supported region, use the `existing_backup_kms_instance_crn` input."
241-
default = "crn:v1:bluemix:public:hs-crypto:us-south:a/abac0df06b644a9cabc6e44f55b3880e:e6dce284-e80f-46e1-a3c1-830f7adff7a9::"
240+
default = null
242241
}
243242

244243
##############################################################
@@ -269,14 +268,14 @@ variable "elasticsearch_key_name" {
269268

270269
variable "existing_secrets_manager_instance_crn" {
271270
type = string
272-
default = "crn:v1:bluemix:public:secrets-manager:us-south:a/abac0df06b644a9cabc6e44f55b3880e:79c6d411-c18f-4670-b009-b0044a238667::"
271+
default = null
273272
description = "The CRN of existing secrets manager to use to create service credential secrets for Databases for Elasticsearch instance."
274273
}
275274

276275
variable "existing_secrets_manager_endpoint_type" {
277276
type = string
278277
description = "The endpoint type to use if `existing_secrets_manager_instance_crn` is specified. Possible values: public, private."
279-
default = "public"
278+
default = "private"
280279
validation {
281280
condition = contains(["public", "private"], var.existing_secrets_manager_endpoint_type)
282281
error_message = "Only \"public\" and \"private\" are allowed values for 'existing_secrets_endpoint_type'."
@@ -300,22 +299,8 @@ variable "service_credential_secrets" {
300299

301300
}))
302301
}))
303-
default = [
304-
{
305-
"secret_group_name" : "test-es-secret-group",
306-
"service_credentials" : [
307-
{
308-
"secret_name" : "test-es-cred-reader",
309-
"service_credentials_source_service_role" : "Reader",
310-
},
311-
{
312-
"secret_name" : "test-es-cred-writer",
313-
"service_credentials_source_service_role" : "Writer",
314-
},
315-
]
316-
},
317-
]
318-
description = "Service credential secrets configuration for Databases for Elasticsearch. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-elasticsearch/tree/main/solutions/instance/DA-types.md#service-credential-secrets)."
302+
default = []
303+
description = "Service credential secrets configuration for Databases for Elasticsearch. [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-icd-elasticsearch/blob/main/solutions/standard/DA-types.md#service-credential-secrets)."
319304

320305
validation {
321306
condition = alltrue([
@@ -339,7 +324,7 @@ variable "skip_es_sm_auth_policy" {
339324
variable "admin_pass_sm_secret_group" {
340325
type = string
341326
description = "The name of a new or existing secrets manager secret group for admin password. To use existing secret group, `use_existing_admin_pass_sm_secret_group` must be set to `true`. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
342-
default = "test-es"
327+
default = "elasticsearch-secrets"
343328
}
344329

345330
variable "use_existing_admin_pass_sm_secret_group" {
@@ -351,7 +336,7 @@ variable "use_existing_admin_pass_sm_secret_group" {
351336
variable "admin_pass_sm_secret_name" {
352337
type = string
353338
description = "The name of a new elasticsearch administrator secret. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
354-
default = "test-es"
339+
default = "elasticsearch-admin-password"
355340
}
356341

357342
##############################################################
@@ -367,7 +352,7 @@ variable "existing_code_engine_project_id" {
367352
variable "enable_kibana_dashboard" {
368353
type = bool
369354
description = "Set it true to deploy Kibana in code engine. NOTE: Kibana image is coming direcly from the official registry (https://www.docker.elastic.co/) and not certified by the IBM."
370-
default = true
355+
default = false
371356
}
372357

373358
variable "elasticsearch_full_version" {
@@ -382,7 +367,7 @@ variable "elasticsearch_full_version" {
382367
variable "existing_backup_kms_key_crn" {
383368
type = string
384369
description = "The CRN of an Hyper Protect Crypto Services or Key Protect encryption key that you want to use to encrypt database backups. If no value is passed, the value of `existing_kms_key_crn` is used. If no value is passed for that, a new key will be created in the provided KMS instance and used for both disk encryption, and backup encryption."
385-
default = "crn:v1:bluemix:public:hs-crypto:us-south:a/abac0df06b644a9cabc6e44f55b3880e:e6dce284-e80f-46e1-a3c1-830f7adff7a9:key:76170fae-4e0c-48c3-8ebe-326059ebb533"
370+
default = null
386371
}
387372

388373
variable "existing_backup_kms_instance_crn" {

0 commit comments

Comments
 (0)