-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: added a new buckets submodule which supports creating multiple …
…buckets (#265)
- Loading branch information
1 parent
f921f5a
commit 6288ad7
Showing
32 changed files
with
760 additions
and
507 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Submodule common-dev-assets
updated
56 files
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
# Basic Example | ||
|
||
An example that will: | ||
- Create a new resource group (if existing one is not passed in). | ||
- Create a new Cloud Object Storage instance and a bucket. | ||
This example creates the following infrastructure: | ||
- A new resource group, if one is not passed in. | ||
- A new Cloud Object Storage instance and a bucket in a resource group and region. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,19 @@ | ||
output "bucket_name" { | ||
description = "Bucket Name" | ||
value = module.cos_bucket.bucket_name | ||
description = "Bucket name" | ||
value = module.cos.bucket_name | ||
} | ||
|
||
output "bucket_crn" { | ||
description = "Bucket CRN" | ||
value = module.cos_bucket.bucket_crn | ||
value = module.cos.bucket_crn | ||
} | ||
|
||
output "bucket_id" { | ||
description = "Bucket id" | ||
value = module.cos_bucket.bucket_id | ||
value = module.cos.bucket_id | ||
} | ||
|
||
output "buckets" { | ||
description = "Bucket from sub module" | ||
value = module.buckets.buckets | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,19 +1,19 @@ | ||
# Complete Example (multiple COS Buckets with retention, encryption, tracking and monitoring enabled) | ||
|
||
An end-to-end example that will: | ||
- Create a new resource group (if existing one is not passed in). | ||
- Create Sysdig and Activity Tracker instances in the given resource group and region. | ||
- Create a new Key Protect instance (with metrics enabled), Key Ring, and Key in the given resource group and region. | ||
- Create a new Cloud Object Storage instance in the given resource group and region. | ||
- Create an IAM Access Policy to allow Key Protect to access COS instance. | ||
- Create COS bucket-1 with: | ||
This example creates the following infrastructure: | ||
- A new resource group, if one is not passed in. | ||
- A Sysdig and Activity Tracker instances in a resource group and region. | ||
- A new Key Protect instance (with metrics enabled), Key Ring, and Key in a resource group and region. | ||
- A new Cloud Object Storage instance in a resource group and region. | ||
- An IAM Access Policy to allow Key Protect to access COS instance. | ||
- COS bucket-1 with: | ||
- Encryption | ||
- Monitoring | ||
- Activity Tracking | ||
- Create COS bucket-2 with: | ||
- COS bucket-2 with: | ||
- Cross Region Location | ||
- Encryption | ||
- Monitoring | ||
- Activity Tracking | ||
- Create a Sample VPC. | ||
- Create Context Based Restriction(CBR) to only allow buckets to be accessible from the VPC. | ||
- A sample VPC. | ||
- A Context Based Restriction(CBR) to only allow buckets to be accessible from the VPC. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,9 @@ | ||
output "bucket_name1" { | ||
description = "Bucket Name" | ||
description = "Bucket name" | ||
value = module.cos_bucket1.bucket_name | ||
} | ||
|
||
output "bucket_name2" { | ||
description = "Bucket Name" | ||
description = "Bucket name" | ||
value = module.cos_bucket2.bucket_name | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,9 @@ | ||
# COS Bucket without encryption using an existing COS instance and Key Protect instance + Keys | ||
# Create Cloud Object Storage instance and a bucket | ||
|
||
An end-to-end example that will: | ||
- Create a new resource group (if existing one is not passed in). | ||
- Create a new Key Protect instance, Key Ring, and Key in the given resource group and region. | ||
- Using the terraform-ibm-cos module, create a new Cloud Object Storage instance in the given resource group and region (with no buckets). | ||
- Create an IAM Access Policy to allow Key Protect to access COS instance (outside of the terraform-ibm-cos module). | ||
- Using the terraform-ibm-cos module, create a COS Bucket without encryption using the existing COS instance, Key Protect instance + Keys created at the start of this example. | ||
This example creates the following infrastructure: | ||
- A new resource group, if one is not passed in. | ||
- A Key Protect instance, key ring, and key in a resource group and region. | ||
- An IAM access policy to allow Cloud Object Storage to access Key Protect for the encryption key. | ||
- A Cloud Object Storage instance with no buckets in a resource group and region. | ||
This example uses the code in the root `terraform-ibm-cos` module. | ||
- Cloud Object Storage buckets with encryption, versioning and archiving respectively. |
Oops, something went wrong.