Skip to content

Commit aeecaa2

Browse files
nupurg-ibmNupur Goyal
andauthored
SML Feature Support (#278)
Added IAM permissions automation. Environment setups provided: minimal, demo, and production. CLI-based deployments supported, including cluster connectivity fully via CLI --------- Co-authored-by: Nupur Goyal <[email protected]>
1 parent 8b6254e commit aeecaa2

16 files changed

+964
-7
lines changed

.secrets.baseline

Lines changed: 121 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2025-06-19T07:38:57Z",
6+
"generated_at": "2025-09-17T10:23:03Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -102,6 +102,126 @@
102102
"type": "Secret Keyword",
103103
"verified_result": null
104104
}
105+
],
106+
"tools/minimal-demo-prod-scripts/README.md": [
107+
{
108+
"hashed_secret": "89a6cfe2a229151e8055abee107d45ed087bbb4f",
109+
"is_secret": true,
110+
"is_verified": false,
111+
"line_number": 36,
112+
"type": "Secret Keyword",
113+
"verified_result": null
114+
},
115+
{
116+
"hashed_secret": "365b78d42089abe4583503eded60fa7c1b3e1cd0",
117+
"is_secret": true,
118+
"is_verified": false,
119+
"line_number": 56,
120+
"type": "Secret Keyword",
121+
"verified_result": null
122+
}
123+
],
124+
"tools/minimal-demo-prod-scripts/catalog_values_demo_deployment.json": [
125+
{
126+
"hashed_secret": "216168000275f83a7bc3599e708c5bafab959783",
127+
"is_secret": true,
128+
"is_verified": false,
129+
"line_number": 2,
130+
"type": "Secret Keyword",
131+
"verified_result": null
132+
},
133+
{
134+
"hashed_secret": "55aac310878e11ce14b29027f77e58cb7c4fe7a4",
135+
"is_secret": true,
136+
"is_verified": false,
137+
"line_number": 8,
138+
"type": "Secret Keyword",
139+
"verified_result": null
140+
},
141+
{
142+
"hashed_secret": "1f5e25be9b575e9f5d39c82dfd1d9f4d73f1975c",
143+
"is_secret": true,
144+
"is_verified": false,
145+
"line_number": 56,
146+
"type": "Secret Keyword",
147+
"verified_result": null
148+
},
149+
{
150+
"hashed_secret": "b295b04949a98dc50ba65adcddd588077b93ab3c",
151+
"is_secret": true,
152+
"is_verified": false,
153+
"line_number": 65,
154+
"type": "Secret Keyword",
155+
"verified_result": null
156+
}
157+
],
158+
"tools/minimal-demo-prod-scripts/catalog_values_minimal_deployment.json": [
159+
{
160+
"hashed_secret": "216168000275f83a7bc3599e708c5bafab959783",
161+
"is_secret": true,
162+
"is_verified": false,
163+
"line_number": 2,
164+
"type": "Secret Keyword",
165+
"verified_result": null
166+
},
167+
{
168+
"hashed_secret": "55aac310878e11ce14b29027f77e58cb7c4fe7a4",
169+
"is_secret": true,
170+
"is_verified": false,
171+
"line_number": 8,
172+
"type": "Secret Keyword",
173+
"verified_result": null
174+
},
175+
{
176+
"hashed_secret": "1f5e25be9b575e9f5d39c82dfd1d9f4d73f1975c",
177+
"is_secret": true,
178+
"is_verified": false,
179+
"line_number": 56,
180+
"type": "Secret Keyword",
181+
"verified_result": null
182+
},
183+
{
184+
"hashed_secret": "b295b04949a98dc50ba65adcddd588077b93ab3c",
185+
"is_secret": true,
186+
"is_verified": false,
187+
"line_number": 65,
188+
"type": "Secret Keyword",
189+
"verified_result": null
190+
}
191+
],
192+
"tools/minimal-demo-prod-scripts/catalog_values_production_deployment.json": [
193+
{
194+
"hashed_secret": "216168000275f83a7bc3599e708c5bafab959783",
195+
"is_secret": true,
196+
"is_verified": false,
197+
"line_number": 2,
198+
"type": "Secret Keyword",
199+
"verified_result": null
200+
},
201+
{
202+
"hashed_secret": "55aac310878e11ce14b29027f77e58cb7c4fe7a4",
203+
"is_secret": true,
204+
"is_verified": false,
205+
"line_number": 8,
206+
"type": "Secret Keyword",
207+
"verified_result": null
208+
},
209+
{
210+
"hashed_secret": "1f5e25be9b575e9f5d39c82dfd1d9f4d73f1975c",
211+
"is_secret": true,
212+
"is_verified": false,
213+
"line_number": 56,
214+
"type": "Secret Keyword",
215+
"verified_result": null
216+
},
217+
{
218+
"hashed_secret": "b295b04949a98dc50ba65adcddd588077b93ab3c",
219+
"is_secret": true,
220+
"is_verified": false,
221+
"line_number": 65,
222+
"type": "Secret Keyword",
223+
"verified_result": null
224+
}
105225
]
106226
},
107227
"version": "0.13.1+ibm.62.dss",

ibm_catalog.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@
4848
"name": "Cluster-with-LSF",
4949
"install_type": "fullstack",
5050
"working_directory": "solutions/lsf",
51+
"terraform_version": "1.10.5",
5152
"compliance": {
5253
"authority": "scc-v3",
5354
"profiles": [

samples/configs/hpc_catalog_values.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@
66
"ssh_keys": "[\"Please fill here\"]",
77
"remote_allowed_ips": "[\"Please fill here\"]",
88
"app_center_gui_password": "Please fill here",
9-
"lsf_version": "Fixpack_15",
9+
"lsf_version": "fixpack_15",
1010
"vpc_name": "__NULL__",
11-
"cluster_subnet_id": "[]",
11+
"cluster_subnet_id": "__NULL__",
1212
"login_subnet_id": "__NULL__",
1313
"vpc_cidr": "10.241.0.0/18",
1414
"vpc_cluster_private_subnets_cidr_blocks": "10.241.0.0/20",
@@ -30,8 +30,8 @@
3030
"enable_vpc_flow_logs": "false",
3131
"enable_ldap": "false",
3232
"ldap_basedns": "lsf.com",
33-
"ldap_server": "null",
34-
"ldap_server_cert": "null",
33+
"ldap_server": "__NULL__",
34+
"ldap_server_cert": "__NULL__",
3535
"ldap_admin_password": "",
3636
"ldap_user_name": "",
3737
"ldap_user_password": "",
@@ -51,7 +51,7 @@
5151
"observability_logs_enable_for_compute": "false",
5252
"observability_enable_platform_logs": "false",
5353
"observability_enable_metrics_routing": "false",
54-
"observability_logs_retention_period": "false",
54+
"observability_logs_retention_period": "7",
5555
"observability_monitoring_on_compute_nodes_enable": "false",
5656
"observability_monitoring_plan": "graduated-tier",
5757
"existing_bastion_instance_name": "__NULL__",

tools/access-management/README.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# IAM Permissions Assignment for LSF Deployment
2+
3+
### Before deploying an IBM Cloud LSF cluster, specific IAM permissions must be assigned to either a user or an access group. This script automates that process.
4+
5+
How to run:
6+
7+
```
8+
ibmcloud login --apikey <YOUR_API_KEY> -g <RESOURCE_GROUP>
9+
10+
chmod +x permissions.sh
11+
12+
./permissions.sh
13+
```

0 commit comments

Comments
 (0)