Skip to content

Commit e74b5f8

Browse files
authored
feat: added existing_secrets_manager_crn, existing_kms_instance_crn and enable_platform_logs_metrics vars and updated to latest member versions (#41)
1 parent 168b67e commit e74b5f8

File tree

2 files changed

+37
-9
lines changed

2 files changed

+37
-9
lines changed

ibm_catalog.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,27 @@
213213
"value": "security-compliance-center-trial-plan"
214214
}
215215
]
216+
},
217+
{
218+
"key": "existing_secrets_manager_crn",
219+
"type": "string",
220+
"default_value": "__NULL__",
221+
"description": "The CRN of an existing Secrets Manager instance to use in this solution. If not set, a new Secrets Manager instance is provisioned.",
222+
"required": false
223+
},
224+
{
225+
"key": "existing_kms_instance_crn",
226+
"type": "string",
227+
"default_value": "__NULL__",
228+
"description": "The CRN of an existing KMS instance to use in this solution. If not set, a new Key Protect instance is provisioned.",
229+
"required": false
230+
},
231+
{
232+
"key": "enable_platform_logs_metrics",
233+
"type": "boolean",
234+
"default_value": true,
235+
"description": "Whether to provision logging and monitoring instances are configured to receive all platform logs and metrics in the target region. There can only be one instance per region provisioned for platform logs/metrics.",
236+
"required": false
216237
}
217238
],
218239
"install_type": "fullstack"

stack_definition.json

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,13 @@
5959
"default": "__NULL__",
6060
"custom_config": {}
6161
},
62+
{
63+
"name": "existing_kms_instance_crn",
64+
"required": false,
65+
"type": "string",
66+
"hidden": false,
67+
"default": "__NULL__"
68+
},
6269
{
6370
"name": "enable_platform_logs_metrics",
6471
"required": false,
@@ -89,7 +96,7 @@
8996
}
9097
],
9198
"name": "1 - core-security-services-kms",
92-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.8493fc70-8755-47c2-a696-ddabe2031673-global"
99+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.bd58fecf-8628-42f5-9954-a5c8a027a10a-global"
93100
},
94101
{
95102
"inputs": [
@@ -107,7 +114,7 @@
107114
},
108115
{
109116
"name": "existing_kms_instance_crn",
110-
"value": "ref:../../members/1 - core-security-services-kms/outputs/key_protect_crn"
117+
"value": "ref:../../members/1 - core-security-services-kms/outputs/kms_instance_crn"
111118
},
112119
{
113120
"name": "cos_instance_name",
@@ -131,7 +138,7 @@
131138
}
132139
],
133140
"name": "2 - core-security-observability",
134-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.dbb2626f-f6d7-498c-9a89-3a0b69997b8a-global"
141+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.725bb882-ba86-4c9e-9714-429054549bf2-global"
135142
},
136143
{
137144
"inputs": [
@@ -149,7 +156,7 @@
149156
},
150157
{
151158
"name": "existing_kms_instance_crn",
152-
"value": "ref:../../members/1 - core-security-services-kms/outputs/key_protect_crn"
159+
"value": "ref:../../members/1 - core-security-services-kms/outputs/kms_instance_crn"
153160
},
154161
{
155162
"name": "kms_endpoint_type",
@@ -169,7 +176,7 @@
169176
}
170177
],
171178
"name": "3 - core-security-services-en",
172-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.37107197-4505-442a-8ac0-406bf8927bc5-global"
179+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.e01967f5-df14-4331-b26a-23ce9d547a4c-global"
173180
},
174181
{
175182
"inputs": [
@@ -191,7 +198,7 @@
191198
},
192199
{
193200
"name": "existing_kms_instance_crn",
194-
"value": "ref:../../members/1 - core-security-services-kms/outputs/key_protect_crn"
201+
"value": "ref:../../members/1 - core-security-services-kms/outputs/kms_instance_crn"
195202
},
196203
{
197204
"name": "existing_monitoring_crn",
@@ -223,7 +230,7 @@
223230
}
224231
],
225232
"name": "4a - core-security-services-scc",
226-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.09aeab5e-2f02-4a86-a281-844fa19d969d-global"
233+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.9090e716-9f05-4f50-aa15-d52a4c974f35-global"
227234
},
228235
{
229236
"inputs": [
@@ -245,7 +252,7 @@
245252
},
246253
{
247254
"name": "existing_kms_instance_crn",
248-
"value": "ref:../../members/1 - core-security-services-kms/outputs/key_protect_crn"
255+
"value": "ref:../../members/1 - core-security-services-kms/outputs/kms_instance_crn"
249256
},
250257
{
251258
"name": "existing_event_notification_instance_crn",
@@ -261,7 +268,7 @@
261268
}
262269
],
263270
"name": "4b - core-security-services-sm",
264-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.ba032ffb-286c-4a00-ad79-ae9e09cea687-global"
271+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.c1f0f9ad-6d6b-4941-af3f-3ca21f8181a5-global"
265272
}
266273
]
267274
}

0 commit comments

Comments
 (0)