Skip to content

Commit 3a4de39

Browse files
feat: enabled add-ons for Security-enforced variation of the DA (#349)
1 parent 8e014d5 commit 3a4de39

File tree

1 file changed

+156
-1
lines changed

1 file changed

+156
-1
lines changed

ibm_catalog.json

Lines changed: 156 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -643,7 +643,54 @@
643643
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
644644
],
645645
"service_name": "secrets-manager",
646-
"notes": "[Optional] Required if you are creating an IBM Cloud Secrets Manager instance. 'Manager' access required to create new secret groups."
646+
"notes": "[Optional] Required if you are creating an Secrets Manager instance. 'Manager' access required to create new secret groups."
647+
},
648+
{
649+
"role_crns": [
650+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
651+
"crn:v1:bluemix:public:iam::::role:Editor"
652+
],
653+
"service_name": "event-notifications",
654+
"notes": "[Optional] Required if you are configuring an Event Notifications Instance."
655+
},
656+
{
657+
"role_crns": [
658+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
659+
"crn:v1:bluemix:public:iam::::role:Editor"
660+
],
661+
"service_name": "sysdig-monitor",
662+
"notes": "[Optional] Required if you are consuming the Observability deployable architecture which sets up Cloud Monitoring."
663+
},
664+
{
665+
"role_crns": [
666+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
667+
"crn:v1:bluemix:public:iam::::role:Editor"
668+
],
669+
"service_name": "logs",
670+
"notes": "[Optional] Required if you are consuming the Observability deployable architecture which sets up Cloud Logs."
671+
},
672+
{
673+
"role_crns": [
674+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
675+
"crn:v1:bluemix:public:iam::::role:Editor"
676+
],
677+
"service_name": "hs-crypto",
678+
"notes": "[Optional] Required if you are creating/configuring keys in an existing Hyper Protect Crypto Services (HPCS) instance for encryption."
679+
},
680+
{
681+
"role_crns": [
682+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
683+
"crn:v1:bluemix:public:iam::::role:Editor"
684+
],
685+
"service_name": "kms",
686+
"notes": "[Optional] Required if you are creating/configuring Key Protect instance and keys for encryption."
687+
},
688+
{
689+
"role_crns": [
690+
"crn:v1:bluemix:public:iam::::role:Administrator"
691+
],
692+
"service_name": "iam-identity",
693+
"notes": "[Optional] Required if Cloud automation for account configuration is enabled."
647694
}
648695
],
649696
"architecture": {
@@ -704,6 +751,114 @@
704751
}
705752
]
706753
},
754+
"dependencies": [
755+
{
756+
"name": "deploy-arch-ibm-account-infra-base",
757+
"description": "Cloud automation for account configuration organizes your IBM Cloud account with a ready-made set of resource groups by default. When you enable the “with account settings” option, it also applies baseline security and governance settings.",
758+
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
759+
"flavors": [
760+
"resource-group-only",
761+
"resource-groups-with-account-settings"
762+
],
763+
"default_flavor": "resource-group-only",
764+
"id": "63641cec-6093-4b4f-b7b0-98d2f4185cd6-global",
765+
"input_mapping": [
766+
{
767+
"dependency_input": "prefix",
768+
"version_input": "prefix",
769+
"reference_version": true
770+
},
771+
{
772+
"dependency_output": "security_resource_group_name",
773+
"version_input": "existing_resource_group_name"
774+
}
775+
],
776+
"optional": true,
777+
"on_by_default": false,
778+
"version": "v3.0.7"
779+
},
780+
{
781+
"name": "deploy-arch-ibm-kms",
782+
"id": "2cad4789-fa90-4886-9c9e-857081c273ee-global",
783+
"description": "Enable Cloud automation for Key Protect to use your own managed encryption keys. If disabled, IBM Cloud's default service-managed encryption is used.",
784+
"flavors": [
785+
"fully-configurable"
786+
],
787+
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
788+
"input_mapping": [
789+
{
790+
"dependency_output": "kms_instance_crn",
791+
"version_input": "existing_kms_instance_crn"
792+
},
793+
{
794+
"dependency_input": "prefix",
795+
"version_input": "prefix",
796+
"reference_version": true
797+
},
798+
{
799+
"dependency_input": "region",
800+
"version_input": "region",
801+
"reference_version": true
802+
}
803+
],
804+
"optional": true,
805+
"on_by_default": true,
806+
"version": "v5.1.4"
807+
},
808+
{
809+
"name": "deploy-arch-ibm-observability",
810+
"description": "Enable to provisions and configures IBM Cloud Monitoring, Activity Tracker, and Log Analysis services for analysing events generated from the Events Notification instance.",
811+
"flavors": [
812+
"instances"
813+
],
814+
"id": "a3137d28-79e0-479d-8a24-758ebd5a0eab-global",
815+
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
816+
"input_mapping": [
817+
{
818+
"dependency_input": "prefix",
819+
"version_input": "prefix",
820+
"reference_version": true
821+
},
822+
{
823+
"dependency_input": "region",
824+
"version_input": "region",
825+
"reference_version": true
826+
}
827+
],
828+
"optional": true,
829+
"on_by_default": true,
830+
"version": "v3.0.3"
831+
},
832+
{
833+
"name": "deploy-arch-ibm-event-notifications",
834+
"description": "Enable Cloud Automation for Event Notifications to configure lifecycle notifications for your Secrets Manager instance.",
835+
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
836+
"flavors": [
837+
"fully-configurable"
838+
],
839+
"id": "c7ac3ee6-4f48-4236-b974-b0cd8c624a46-global",
840+
"input_mapping": [
841+
{
842+
"dependency_output": "crn",
843+
"version_input": "existing_event_notifications_instance_crn"
844+
},
845+
{
846+
"dependency_input": "prefix",
847+
"version_input": "prefix",
848+
"reference_version": true
849+
},
850+
{
851+
"dependency_input": "region",
852+
"version_input": "region",
853+
"reference_version": true
854+
}
855+
],
856+
"optional": true,
857+
"on_by_default": true,
858+
"version": "v2.3.7"
859+
}
860+
],
861+
"dependency_version_2": true,
707862
"terraform_version": "1.10.5"
708863
}
709864
]

0 commit comments

Comments
 (0)