@@ -13,9 +13,10 @@ module "resource_group" {
1313# ######################################################################################################################
1414
1515locals {
16+ prefix = (var. prefix != null && trimspace (var. prefix ) != " " ? " ${ var . prefix } -" : " " )
1617 create_new_kms_key = var. existing_elasticsearch_instance_crn == null && ! var. use_ibm_owned_encryption_key && var. existing_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if encryption not enabled, using existing Elasticsearch, passing an existing key, or using IBM owned keys
17- elasticsearch_key_name = (var . prefix != null && var . prefix != " " ) ? " ${ var . prefix } - ${ var . elasticsearch_key_name } " : var . elasticsearch_key_name
18- elasticsearch_key_ring_name = (var . prefix != null && var . prefix != " " ) ? " ${ var . prefix } - ${ var . elasticsearch_key_ring_name } " : var . elasticsearch_key_ring_name
18+ elasticsearch_key_name = " ${ local . prefix } ${ var . elasticsearch_key_name } "
19+ elasticsearch_key_ring_name = " ${ local . prefix } ${ var . elasticsearch_key_ring_name } "
1920}
2021
2122
@@ -275,7 +276,7 @@ module "elasticsearch" {
275276 source = " ../.."
276277 depends_on = [time_sleep . wait_for_authorization_policy , time_sleep . wait_for_backup_kms_authorization_policy ]
277278 resource_group_id = module. resource_group . resource_group_id
278- name = (var . prefix != null && var . prefix != " " ) ? " ${ var . prefix } - ${ var . elasticsearch_name } " : var . elasticsearch_name
279+ name = " ${ local . prefix } ${ var . elasticsearch_name } "
279280 region = var. region
280281 plan = var. plan
281282 skip_iam_authorization_policy = var. skip_es_kms_auth_policy
@@ -375,10 +376,10 @@ locals {
375376
376377 # Build the structure of the arbitrary credential type secret for admin password
377378 admin_pass_secret = [{
378- secret_group_name = (var.prefix != null && var.prefix != " " ) && var.admin_pass_secrets_manager_secret_group != null ? " ${ var . prefix } - ${ var . admin_pass_secrets_manager_secret_group } " : var.admin_pass_secrets_manager_secret_group
379+ secret_group_name = " ${ local . prefix } ${ var . admin_pass_secrets_manager_secret_group } "
379380 existing_secret_group = var.use_existing_admin_pass_secrets_manager_secret_group
380381 secrets = [{
381- secret_name = (var.prefix != null && var.prefix != " " ) && var.admin_pass_secrets_manager_secret_name != null ? " ${ var . prefix } - ${ var . admin_pass_secrets_manager_secret_name } " : var.admin_pass_secrets_manager_secret_name
382+ secret_name = " ${ local . prefix } ${ var . admin_pass_secrets_manager_secret_name } "
382383 secret_type = " arbitrary"
383384 secret_payload_password = local.admin_pass
384385 }
@@ -410,8 +411,8 @@ module "secrets_manager_service_credentials" {
410411
411412locals {
412413 code_engine_project_id = var. existing_code_engine_project_id != null ? var. existing_code_engine_project_id : null
413- code_engine_project_name = local. code_engine_project_id != null ? null : (var . prefix != null && var . prefix != " " ) ? " ${ var . prefix } - ${ var . kibana_code_engine_new_project_name } " : var . kibana_code_engine_new_project_name
414- code_engine_app_name = (var . prefix != null && var . prefix != " " ) ? " ${ var . prefix } - ${ var . kibana_code_engine_new_app_name } " : var . kibana_code_engine_new_app_name
414+ code_engine_project_name = local. code_engine_project_id != null ? null : " ${ local . prefix } ${ var . kibana_code_engine_new_project_name } "
415+ code_engine_app_name = " ${ local . prefix } ${ var . kibana_code_engine_new_app_name } "
415416 kibana_version = var. enable_kibana_dashboard ? jsondecode (data. http . es_metadata [0 ]. response_body ). version . number : null
416417}
417418
0 commit comments