|
21 | 21 | "solution" |
22 | 22 | ], |
23 | 23 | "short_description": "Create and configure a Secrets Manager instance with optional security, logging, and notification services", |
24 | | - "long_description": "This deployable architecture is used to provision and configure an [IBM Cloud Secrets Manager](https://www.ibm.com/products/secrets-manager) instance. It optionally supports creating and configuring the following:\n* [an IBM Cloud account](https://cloud.ibm.com/docs/account?topic=account-account-getting-started) to set up basic account settings.\n* [Key Protect](https://cloud.ibm.com/docs/key-protect?topic=key-protect-getting-started-tutorial) for data encryption by using your own managed keys.\n* [Cloud Logs](https://cloud.ibm.com/docs/cloud-logs?topic=cloud-logs-getting-started) for logging and monitoring platform logs.\n* [Cloud Monitoring](https://cloud.ibm.com/docs/monitoring?topic=monitoring-getting-started) to measure how users and applications interact with the Secrets Manager instance.\n* [Event Notifications](https://cloud.ibm.com/docs/event-notifications?topic=event-notifications-getting-started) to send notifications of events to other users, or destinations, by using email, SMS or other supported delivery channels.\n\nℹ️ This deployable architecture is a part of a larger collection that IBM provides. Each deployable architecture focuses on a single IBM Cloud service. You can use these deployable architectures on their own to automate deployments by following an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or you can [combine them together](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to deploy a more complex end-to-end solution architecture.", |
| 24 | + "long_description": "This deployable architecture is used to provision and configure an [IBM Cloud Secrets Manager](https://www.ibm.com/products/secrets-manager) instance. It optionally supports creating [Key Protect](https://cloud.ibm.com/docs/key-protect?topic=key-protect-getting-started-tutorial) for data encryption by using your own managed keys.\n* [Cloud Logs](https://cloud.ibm.com/docs/cloud-logs?topic=cloud-logs-getting-started) for logging and monitoring platform logs.\n* [Cloud Monitoring](https://cloud.ibm.com/docs/monitoring?topic=monitoring-getting-started) to measure how users and applications interact with the Secrets Manager instance.\n* [Event Notifications](https://cloud.ibm.com/docs/event-notifications?topic=event-notifications-getting-started) to send notifications of events to other users, or destinations, by using email, SMS or other supported delivery channels.\n\nℹ️ This deployable architecture is a part of a larger collection that IBM provides. Each deployable architecture focuses on a single IBM Cloud service. You can use these deployable architectures on their own to automate deployments by following an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or you can [combine them together](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to deploy a more complex end-to-end solution architecture.", |
25 | 25 | "offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager/blob/main/README.md", |
26 | 26 | "offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-secrets-manager/main/images/secrets_manager.svg", |
27 | 27 | "provider_name": "IBM", |
|
401 | 401 | ], |
402 | 402 | "service_name": "kms", |
403 | 403 | "notes": "[Optional] Required if you are creating and configuring a Key Protect instance for key encryption." |
404 | | - }, |
405 | | - { |
406 | | - "role_crns": [ |
407 | | - "crn:v1:bluemix:public:iam::::role:Administrator" |
408 | | - ], |
409 | | - "service_name": "iam-identity", |
410 | | - "notes": "[Optional] Required to deploy Cloud automation for account configuration, which creates foundational IBM Cloud account resources, like IAM settings, trusted profiles, access groups, and resource groups." |
411 | 404 | } |
412 | 405 | ], |
413 | 406 | "architecture": { |
|
429 | 422 | ] |
430 | 423 | }, |
431 | 424 | "dependencies": [ |
432 | | - { |
433 | | - "name": "deploy-arch-ibm-account-infra-base", |
434 | | - "description": "Organize your IBM Cloud account with preconfigured resource groups. If not selected, the default resource group is used. Optionally, expand to apply recommended security controls via \"with Account Settings\" variation.", |
435 | | - "catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3", |
436 | | - "flavors": [ |
437 | | - "resource-group-only", |
438 | | - "resource-groups-with-account-settings" |
439 | | - ], |
440 | | - "default_flavor": "resource-group-only", |
441 | | - "id": "63641cec-6093-4b4f-b7b0-98d2f4185cd6-global", |
442 | | - "input_mapping": [ |
443 | | - { |
444 | | - "dependency_input": "prefix", |
445 | | - "version_input": "prefix", |
446 | | - "reference_version": true |
447 | | - }, |
448 | | - { |
449 | | - "dependency_output": "security_resource_group_name", |
450 | | - "version_input": "existing_resource_group_name" |
451 | | - } |
452 | | - ], |
453 | | - "optional": true, |
454 | | - "on_by_default": false, |
455 | | - "version": "v3.0.23" |
456 | | - }, |
457 | 425 | { |
458 | 426 | "name": "deploy-arch-ibm-kms", |
459 | 427 | "id": "2cad4789-fa90-4886-9c9e-857081c273ee-global", |
|
467 | 435 | "dependency_output": "kms_instance_crn", |
468 | 436 | "version_input": "existing_kms_instance_crn" |
469 | 437 | }, |
| 438 | + { |
| 439 | + "dependency_input": "existing_resource_group_name", |
| 440 | + "version_input": "resource_group", |
| 441 | + "reference_version": true |
| 442 | + }, |
470 | 443 | { |
471 | 444 | "version_input": "kms_encryption_enabled", |
472 | 445 | "value": true |
|
484 | 457 | ], |
485 | 458 | "optional": true, |
486 | 459 | "on_by_default": true, |
487 | | - "version": "v5.1.27" |
| 460 | + "version": "v5.3.6" |
488 | 461 | }, |
489 | 462 | { |
490 | 463 | "name": "deploy-arch-ibm-cloud-logs", |
|
500 | 473 | "version_input": "prefix", |
501 | 474 | "reference_version": true |
502 | 475 | }, |
| 476 | + { |
| 477 | + "dependency_input": "existing_resource_group_name", |
| 478 | + "version_input": "resource_group", |
| 479 | + "reference_version": true |
| 480 | + }, |
503 | 481 | { |
504 | 482 | "dependency_input": "region", |
505 | 483 | "version_input": "region", |
|
528 | 506 | "dependency_output": "cloud_monitoring_crn", |
529 | 507 | "version_input": "existing_monitoring_crn" |
530 | 508 | }, |
| 509 | + { |
| 510 | + "dependency_input": "existing_resource_group_name", |
| 511 | + "version_input": "resource_group", |
| 512 | + "reference_version": true |
| 513 | + }, |
531 | 514 | { |
532 | 515 | "dependency_input": "prefix", |
533 | 516 | "version_input": "prefix", |
|
546 | 529 | ], |
547 | 530 | "optional": true, |
548 | 531 | "on_by_default": true, |
549 | | - "version": "v1.7.2" |
| 532 | + "version": "v1.8.7" |
550 | 533 | }, |
551 | 534 | { |
552 | 535 | "name": "deploy-arch-ibm-activity-tracker", |
|
562 | 545 | "version_input": "prefix", |
563 | 546 | "reference_version": true |
564 | 547 | }, |
| 548 | + { |
| 549 | + "dependency_input": "existing_resource_group_name", |
| 550 | + "version_input": "resource_group", |
| 551 | + "reference_version": true |
| 552 | + }, |
565 | 553 | { |
566 | 554 | "dependency_input": "region", |
567 | 555 | "version_input": "region", |
|
585 | 573 | "dependency_output": "crn", |
586 | 574 | "version_input": "existing_event_notifications_instance_crn" |
587 | 575 | }, |
| 576 | + { |
| 577 | + "dependency_input": "existing_resource_group_name", |
| 578 | + "version_input": "resource_group", |
| 579 | + "reference_version": true |
| 580 | + }, |
588 | 581 | { |
589 | 582 | "dependency_input": "prefix", |
590 | 583 | "version_input": "prefix", |
|
0 commit comments