Skip to content

Commit 3a9ff26

Browse files
2 parents 6510cf4 + b4b6491 commit 3a9ff26

32 files changed

+1187
-545
lines changed

.secrets.baseline

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-12-10T06:39:44Z",
6+
"generated_at": "2023-12-12T06:39:44Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@
66
[![Renovate enabled](https://img.shields.io/badge/renovate-enabled-brightgreen.svg)](https://renovatebot.com/)
77
[![semantic-release](https://img.shields.io/badge/%20%20%F0%9F%93%A6%F0%9F%9A%80-semantic--release-e10079.svg)](https://github.com/semantic-release/semantic-release)
88

9+
> [!IMPORTANT]
10+
> The IBM Log Analysis and IBM Cloud Activity Tracker services are deprecated. IBM Cloud Logs is the replacement service. This module will be updated to provision the new services before the end of support in March 2025.
11+
912
This repository contains the following infrastructure as code solutions:
1013
- [IBM Cloud Observability instances solution](./solutions/instances)
1114
- [IBM Cloud Observability agents solution](./solutions/agents)
1215

13-
**NB:** These solutions are not intended to be called by one or more other modules since they contain a provider configurations, meaning they are not compatible with the `for_each`, `count`, and `depends_on` arguments. For more information see [Providers Within Modules](https://developer.hashicorp.com/terraform/language/modules/develop/providers)
16+
> [!NOTE]
17+
> These solutions are not intended to be called by one or more other modules because they contain a provider configurations. They are not compatible with the `for_each`, `count`, and `depends_on` arguments. For more information see [Providers Within Modules](https://developer.hashicorp.com/terraform/language/modules/develop/providers).
1418
1519
<!-- Leave this section as is so that your module has a link to local development environment set up steps for contributors to follow -->
1620
## Contributing

cra-config.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ version: "v1"
33
CRA_TARGETS:
44
- CRA_TARGET: "solutions/instances"
55
CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json"
6-
PROFILE_ID: "bfacb71d-4b84-41ac-9825-e8a3a3eb7405" # SCC profile ID (currently set to IBM Cloud Framework for Financial Services 1.6.0 profile).
6+
PROFILE_ID: "fe96bd4d-9b37-40f2-b39f-a62760e326a3" # SCC profile ID (currently set to 'IBM Cloud Framework for Financial Services' '1.7.0' profile).
77
CRA_ENVIRONMENT_VARIABLES:
8-
TF_VAR_resource_group_name: "test"
9-
TF_VAR_existing_kms_instance_crn: "XXXX:hs-crypto:XXXXXXX:XXXXX:XXXXX"
8+
TF_VAR_resource_group_name: "test"
9+
TF_VAR_existing_kms_instance_crn: "crn:v1:bluemix:public:hs-crypto:us-south:a/abac0df06b644a9cabc6e44f55b3880e:e6dce284-e80f-46e1-a3c1-830f7adff7a9::"

cra-tf-validate-ignore-rules.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,22 @@
11
{
2-
"scc_rules": []
2+
"scc_rules": [
3+
{
4+
"scc_rule_id": "rule-4d86c074-097e-4ff3-a763-ccff128388e2",
5+
"description": "Check whether multifactor authentication (MFA) is enabled at the account level",
6+
"ignore_reason": "We have added an account level data lookup. Since we do not create any account setting in this DA, it can be ignored",
7+
"is_valid": true
8+
},
9+
{
10+
"scc_rule_id": "rule-0704e840-e443-4781-b9be-ec57469d09c1",
11+
"description": "Check whether permissions for API key creation are limited and configured in IAM settings for the account owner",
12+
"ignore_reason": "We have added an account level data lookup. Since we do not create any account setting in this DA, it can be ignored",
13+
"is_valid": true
14+
},
15+
{
16+
"scc_rule_id": "rule-0244c010-fde6-4db3-95aa-8952bd292ac3",
17+
"description": "Check whether permissions for service ID creation are limited and configured in IAM settings for the account owner",
18+
"ignore_reason": "We have added an account level data lookup. Since we do not create any account setting in this DA, it can be ignored",
19+
"is_valid": true
20+
}
21+
]
322
}

0 commit comments

Comments
 (0)