You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -930,7 +930,7 @@ module "cluster_pattern" {
930
930
| <aname="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints)| Service endpoints for the App ID resource when created by the module. Can be `public`, `private`, or `public-and-private`|`string`|`"public-and-private"`| no |
931
931
| <aname="input_skip_all_s2s_auth_policies"></a> [skip\_all\_s2s\_auth\_policies](#input\_skip\_all\_s2s\_auth\_policies)| Whether to skip the creation of all of the service-to-service authorization policies. If setting to true, policies must be in place on the account before provisioning. |`bool`|`false`| no |
932
932
| <aname="input_skip_kms_block_storage_s2s_auth_policy"></a> [skip\_kms\_block\_storage\_s2s\_auth\_policy](#input\_skip\_kms\_block\_storage\_s2s\_auth\_policy)| Whether to skip the creation of a service-to-service authorization policy between block storage and the key management service. |`bool`|`false`| no |
933
-
| <aname="input_skip_kms_kube_s2s_auth_policy"></a> [skip\_kms\_kube\_s2s\_auth\_policy](#input\_skip\_kms\_kube\_s2s\_auth\_policy)| Whether to skip the creation of a service-to-serivce authorization policy between kubernetes and the key management service. |`bool`|`false`| no |
933
+
| <aname="input_skip_kms_kube_s2s_auth_policy"></a> [skip\_kms\_kube\_s2s\_auth\_policy](#input\_skip\_kms\_kube\_s2s\_auth\_policy)| Whether to skip the creation of a service-to-service authorization policy between kubernetes and the key management service. |`bool`|`false`| no |
934
934
| <aname="input_ssh_keys"></a> [ssh\_keys](#input\_ssh\_keys)| SSH keys to use to provision a VSI. Must be an RSA key with a key size of either 2048 bits or 4096 bits (recommended). If `public_key` is not provided, the named key will be looked up from data. If a resource group name is added, it must be included in `var.resource_groups`. See https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys.| <pre>list(<br/> object({<br/> name = string<br/> public_key = optional(string)<br/> resource_group = optional(string)<br/> })<br/> )</pre> | n/a | yes |
935
935
| <aname="input_tags"></a> [tags](#input\_tags)| List of resource tags to apply to resources created by this module. |`list(string)`|`[]`| no |
936
936
| <aname="input_teleport_config_data"></a> [teleport\_config\_data](#input\_teleport\_config\_data)| Teleport config data. This is used to create a single template for all teleport instances to use. Creating a single template allows for values to remain sensitive | <pre>object({<br/> teleport_license = optional(string)<br/> https_cert = optional(string)<br/> https_key = optional(string)<br/> domain = optional(string)<br/> cos_bucket_name = optional(string)<br/> cos_key_name = optional(string)<br/> teleport_version = optional(string)<br/> message_of_the_day = optional(string)<br/> hostname = optional(string)<br/> app_id_key_name = optional(string)<br/> claims_to_roles = optional(<br/> list(<br/> object({<br/> email = string<br/> roles = list(string)<br/> })<br/> )<br/> )<br/> })</pre> |`null`| no |
@@ -957,7 +957,7 @@ module "cluster_pattern" {
957
957
| <aname="output_bastion_host_names"></a> [bastion\_host\_names](#output\_bastion\_host\_names)| List of bastion host names |
958
958
| <aname="output_cluster_data"></a> [cluster\_data](#output\_cluster\_data)| List of cluster data |
959
959
| <aname="output_cluster_names"></a> [cluster\_names](#output\_cluster\_names)| List of create cluster names |
960
-
| <aname="output_cos_bucket_data"></a> [cos\_bucket\_data](#output\_cos\_bucket\_data)| List of data for COS buckets creaed|
960
+
| <aname="output_cos_bucket_data"></a> [cos\_bucket\_data](#output\_cos\_bucket\_data)| List of data for COS buckets created|
961
961
| <aname="output_cos_bucket_names"></a> [cos\_bucket\_names](#output\_cos\_bucket\_names)| List of names for COS buckets created |
962
962
| <aname="output_cos_data"></a> [cos\_data](#output\_cos\_data)| List of Cloud Object Storage instance data |
963
963
| <aname="output_cos_key_credentials_map"></a> [cos\_key\_credentials\_map](#output\_cos\_key\_credentials\_map)| Map of resource key credentials created for COS instances, organized by the key name supplied in the `cos.keys[]` input variable. Contains sensitive output including API keys and HMAC credentials. |
"description": "This deployable architecture deploys a simple Virtual Private Cloud (VPC) infrastructure without any compute resources. You can use this architecture as a base on which to deploy compute resources. This variation uses two Virtual Private Clouds (VPC) - a Management VPC and a Workload VPC - to manage the environment and the deployed workload. Each VPC is a multi-zoned, multi-subnet implementation that keeps your workloads secure. A transit gateway connects the VPCs to each other and Virtual Private Endpoints are used connect to IBM Cloud services.<br><br> This variation integrates <b>key mangement services</b> to enhance security. It also leverages <b>Activity Tracker and Flow Logs</b> to collect and store Internet Protocol (IP) traffic information.<br><br> It securely connects to multiple networks with a <b>site-to-site</b> virtual private network and uses an <b>edge VPC</b> for secure access through the public internet . It configures <b>CBR (Context-based restrictions)</b> rules to allow traffic to flow only from the landing zone VPCs to specific cloud services. <br><br>This deployable architecture simplifies risk management and demonstrates regulatory compliance with Financial Services."
1164
+
"description": "This deployable architecture deploys a simple Virtual Private Cloud (VPC) infrastructure without any compute resources. You can use this architecture as a base on which to deploy compute resources. This variation uses two Virtual Private Clouds (VPC) - a Management VPC and a Workload VPC - to manage the environment and the deployed workload. Each VPC is a multi-zoned, multi-subnet implementation that keeps your workloads secure. A transit gateway connects the VPCs to each other and Virtual Private Endpoints are used connect to IBM Cloud services.<br><br> This variation integrates <b>key management services</b> to enhance security. It also leverages <b>Activity Tracker and Flow Logs</b> to collect and store Internet Protocol (IP) traffic information.<br><br> It securely connects to multiple networks with a <b>site-to-site</b> virtual private network and uses an <b>edge VPC</b> for secure access through the public internet . It configures <b>CBR (Context-based restrictions)</b> rules to allow traffic to flow only from the landing zone VPCs to specific cloud services. <br><br>This deployable architecture simplifies risk management and demonstrates regulatory compliance with Financial Services."
0 commit comments