You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 19, 2025. It is now read-only.
feat: added support to attach SCC Workload Protection instance to the SCC instance. If provision_scc_workload_protection is true, the instance will automatically be attached (#53)
Copy file name to clipboardExpand all lines: solutions/instances/README.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,6 @@ This solution supports the following:
8
8
9
9
**NB:** This solution is not intended to be called by one or more other modules since it contains a provider configurations, meaning it is not compatible with the `for_each`, `count`, and `depends_on` arguments. For more information see [Providers Within Modules](https://developer.hashicorp.com/terraform/language/modules/develop/providers)
10
10
11
-
### Current limitation
12
-
Currently this solution does not support attaching the Workload Protection instance to the SCC instance. That enhancement is being tracked in https://github.com/terraform-ibm-modules/terraform-ibm-scc-da/issues/23
13
-
14
11
<!-- Below content is automatically populated via pre-commit hook -->
15
12
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
16
13
### Requirements
@@ -27,7 +24,7 @@ Currently this solution does not support attaching the Workload Protection insta
| <aname="input_scc_wp_service_plan"></a> [scc\_wp\_service\_plan](#input\_scc\_wp\_service\_plan)| SCC Workload Protection instance service pricing plan. Allowed values are: `free-trial` or `graduated-tier`. |`string`|`"graduated-tier"`| no |
73
70
| <aname="input_skip_cos_kms_auth_policy"></a> [skip\_cos\_kms\_auth\_policy](#input\_skip\_cos\_kms\_auth\_policy)| Set to true to skip the creation of an IAM authorization policy that permits the COS instance created to read the encryption key from the KMS instance. WARNING: An authorization policy must exist before an encrypted bucket can be created |`bool`|`false`| no |
74
71
| <aname="input_skip_scc_cos_auth_policy"></a> [skip\_scc\_cos\_auth\_policy](#input\_skip\_scc\_cos\_auth\_policy)| Set to true to skip the creation of an IAM authorization policy that permits the SCC instance created by this solution write access to the COS instance. Only used if `provision_scc_instance` is set to true. |`bool`|`false`| no |
72
+
| <aname="input_skip_scc_wp_auth_policy"></a> [skip\_scc\_wp\_auth\_policy](#input\_skip\_scc\_wp\_auth\_policy)| Set to true to skip the creation of an IAM authorization policy that permits the SCC instance created by this solution read access to the workload protection instance. Only used if `provision_scc_workload_protection` is set to true. |`bool`|`false`| no |
75
73
| <aname="input_use_existing_resource_group"></a> [use\_existing\_resource\_group](#input\_use\_existing\_resource\_group)| Whether to use an existing resource group. |`bool`|`false`| no |
description="Set to true to skip the creation of an IAM authorization policy that permits the SCC instance created by this solution read access to the workload protection instance. Only used if `provision_scc_workload_protection` is set to true."
0 commit comments