-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add profile attachments to DA stack #121
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR. I put some comments. Also we should scope the scan to the resource group created by the infra DA (first in the list). This will likely require an update on the SCC DA side as I do not see that option there.
@@ -284,6 +284,13 @@ | |||
"default_value": "__NULL__", | |||
"description": "The CRN of an existing KMS instance to use in this solution. If not set, a new KP instance is provisioned.", | |||
"required": false | |||
}, | |||
{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would not expose this input directly at the top level of the stack as it is unlikely to be common to change it.
stack_definition.json
Outdated
@@ -212,6 +219,10 @@ | |||
"name": "existing_kms_instance_crn", | |||
"value": "ref:../2a - Security Service - Key Management/outputs/kms_instance_crn" | |||
}, | |||
{ | |||
"name": "profile_attachments", | |||
"value": "ref:../../inputs/profile_attachments" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Set the default here - point to the AI ICT Guardrails (as opposed to fs cloud) as this is what we're claiming in the stack.
…rieval-augmented-generation into scc-feat
/run pipeline |
/run pipeline |
/run pipeline |
@vburckhardt As per the discussions here, we went with a basic list input variable and a predefined attachment configuration scoped to full account in order to keep the input variable simple to use via Projects. As per that discussion, we also created an internal issue to expose a more advanced complex object type input, with supporting documentation on how to pass values to it from Projects UI, where users could basically customise exactly how they want there attachment to be set up. Even if we had that advanced object type input variable, I don't think we would be able to reference the resource group outputs from the stack member DAs? I don't think it supports a kind of syntax like this?
|
…al-augmented-generation into scc-feat
/run pipeline |
/run pipeline |
1 similar comment
/run pipeline |
/run pipeline |
A couple of comments:
|
@jor2 agree, lets do monthly by default in the stack |
…rieval-augmented-generation into scc-feat
/run pipeline |
/run pipeline |
@ocofaigh is this a know error?
|
I think we should set watsonx_project_name parameter to This should skip project creation and the bug that is related to that. If any test code uses Watsonx SaaS DA, it should set that to Now I am leaning towards the theory that this might be the timing issue with provisioning a new WML instance and immediately creating a new project in it, because in my stack deployments there is about 10 minutes gap between those two actions (because I suppress creating a project in Watson SaaS DA by the parameter above). And I did not get the same error even when trying to use some different combinations of credentials. |
/run pipeline |
/run pipeline |
/run pipeline |
two blockers:
|
/run pipeline |
The current code now created an SCC attachment by default, however its scoped to the full account and the schedule is also hard coded. Since Jordan is off for a few weeks, I created #188 to track adding these updates, and going to close this PR. |
Description
Configure SCC to create default attachment aligned with compliance claims for this stack
#13
Release required?
x.x.X
)x.X.x
)X.x.x
)Release notes content
Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers