You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_active_session_timeout"></a> [active\_session\_timeout](#input\_active\_session\_timeout)| Specify how long, in seconds, a user is allowed to work continuously in the account. This variable is ignored when `skip_iam_account_settings` is set to `true`. |`number`|`86400`| no |
107
107
| <aname="input_allowed_ip_addresses"></a> [allowed\_ip\_addresses](#input\_allowed\_ip\_addresses)| List of the IP addresses and subnets that can create IAM tokens for the account. This variable is ignored when `skip_iam_account_settings` is set to `true`. |`list(any)`|`[]`| no |
108
108
| <aname="input_api_creation"></a> [api\_creation](#input\_api\_creation)| When this variable is set to `RESTRICTED`, only users who are assigned the User API key creator role on the IAM Identity Service can create API keys, including the account owner. When set to `NOT_SET`, the previous value for this variable is cleared. Allowed values are `RESTRICTED`, `NOT_RESTRICTED`, or `NOT_SET`. This variable is ignored when `skip_iam_account_settings` is set to `true`. |`string`|`"RESTRICTED"`| no |
109
+
| <a name="input_appconfig_aggregator_service_access"></a> [appconfig\_aggregator\_service\_access](#input\_appconfig\_aggregator\_service\_access) | Set rule for App Configuration to a list of services supported by the configuration aggregator. The default is true. The full list of services can be found [here](https://cloud.ibm.com/docs/app-configuration?topic=app-configuration-ac-configuration-aggregator#ac-list-of-services-configaggregator). However, CBR rules will only be created for the CBR-supported services. Service references in the CBR zone are not supported for databases. | `map(bool)` | <pre>{<br/> "IAM": true,<br/> "apprapp": true,<br/> "atracker": true,<br/> "cloud-object-storage": true,<br/> "codeengine": true,<br/> "container-registry": true,<br/> "dns-svcs": true,<br/> "event-notifications": true,<br/> "globalcatalog-collection": true,<br/> "hs-crypto": true,<br/> "is": true,<br/> "kms": true,<br/> "logs": true,<br/> "messagehub": true,<br/> "schematics": true,<br/> "secrets-manager": true,<br/> "sysdig-monitor": true,<br/> "sysdig-secure": true,<br/> "transit": true<br/>}</pre> | no |
109
110
| <aname="input_audit_resource_group_name"></a> [audit\_resource\_group\_name](#input\_audit\_resource\_group\_name)| The name of the audit resource group to create. |`string`|`"audit-rg"`| no |
110
111
| <aname="input_cbr_allow_at_to_cos"></a> [cbr\_allow\_at\_to\_cos](#input\_cbr\_allow\_at\_to\_cos)| Set to `true` to allow Activity Tracker Event Routing access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
111
112
| <aname="input_cbr_allow_block_storage_to_kms"></a> [cbr\_allow\_block\_storage\_to\_kms](#input\_cbr\_allow\_block\_storage\_to\_kms)| Set to `true` to allow Block Storage for VPC access to the key management service. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
@@ -116,6 +117,8 @@ No resources.
116
117
| <aname="input_cbr_allow_is_to_cos"></a> [cbr\_allow\_is\_to\_cos](#input\_cbr\_allow\_is\_to\_cos)| Set to `true` to allow Virtual Private Cloud Infrastructure Services access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
117
118
| <aname="input_cbr_allow_roks_to_kms"></a> [cbr\_allow\_roks\_to\_kms](#input\_cbr\_allow\_roks\_to\_kms)| Set to `true` to allow Red Hat OpenShift access to the key management service. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
118
119
| <aname="input_cbr_allow_scc_to_cos"></a> [cbr\_allow\_scc\_to\_cos](#input\_cbr\_allow\_scc\_to\_cos)| Set to `true` to allow Security and Compliance Center access to Object Storage. Default is `true` if `provision_cbr` is `true`. |`bool`|`true`| no |
120
+
| <aname="input_cbr_allow_scc_wp_to_appconfig"></a> [cbr\_allow\_scc\_wp\_to\_appconfig](#input\_cbr\_allow\_scc\_wp\_to\_appconfig)| Set to `true` to allow Security and Compliance Center access to App Configuration. Default is `true` if `provision_cbr` is `true`. |`bool`|`true`| no |
121
+
| <aname="input_cbr_allow_scc_wp_to_cloud_monitoring"></a> [cbr\_allow\_scc\_wp\_to\_cloud\_monitoring](#input\_cbr\_allow\_scc\_wp\_to\_cloud\_monitoring)| Set to `true` to allow Security and Compliance Center access to Cloud Monitoring. Default is `true` if `provision_cbr` is `true`. |`bool`|`true`| no |
119
122
| <aname="input_cbr_allow_vpcs_to_container_registry"></a> [cbr\_allow\_vpcs\_to\_container\_registry](#input\_cbr\_allow\_vpcs\_to\_container\_registry)| Set to `true` to allow Virtual Private Clouds access to the Container Registry. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
120
123
| <aname="input_cbr_allow_vpcs_to_cos"></a> [cbr\_allow\_vpcs\_to\_cos](#input\_cbr\_allow\_vpcs\_to\_cos)| Set to `true` to allows Virtual Private Clouds access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
121
124
| <aname="input_cbr_allow_vpcs_to_iam_access_management"></a> [cbr\_allow\_vpcs\_to\_iam\_access\_management](#input\_cbr\_allow\_vpcs\_to\_iam\_access\_management)| Set to `true` to allow Virtual Private Clouds access to IAM access management. Default is `true` if `provision_cbr` is set to `true`. |`bool`|`true`| no |
description="Details of the target service for which a rule is created. The key is the service name."
385
385
default={}
386
386
}
387
+
388
+
variable"cbr_allow_scc_wp_to_appconfig" {
389
+
description="Set to `true` to allow Security and Compliance Center access to App Configuration. Default is `true` if `provision_cbr` is `true`."
390
+
type=bool
391
+
default=true
392
+
}
393
+
394
+
variable"cbr_allow_scc_wp_to_cloud_monitoring" {
395
+
description="Set to `true` to allow Security and Compliance Center access to Cloud Monitoring. Default is `true` if `provision_cbr` is `true`."
396
+
type=bool
397
+
default=true
398
+
}
399
+
400
+
variable"appconfig_aggregator_service_access" {
401
+
description="Set rule for App Configuration to a list of services supported by the configuration aggregator. The default is true. The full list of services can be found [here](https://cloud.ibm.com/docs/app-configuration?topic=app-configuration-ac-configuration-aggregator#ac-list-of-services-configaggregator). However, CBR rules will only be created for the CBR-supported services. Service references in the CBR zone are not supported for databases."
0 commit comments