generated from terraform-ibm-modules/terraform-ibm-module-template
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmain.tf
63 lines (56 loc) · 2.24 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
##############################################################################
# Resource Group
##############################################################################
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
version = "1.1.6"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
}
##############################################################################
# Event Notification
##############################################################################
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
version = "1.15.1"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
plan = "lite"
service_endpoints = "public"
region = var.region
}
##############################################################################
# Key Protect
##############################################################################
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
version = "4.17.1"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
keys = [
{
key_ring_name = "${var.prefix}-sm"
keys = [
{
key_name = "${var.prefix}-sm-key"
force_delete = true
}
]
}
]
}
##############################################################################
# Secrets Manager
##############################################################################
module "secrets_manager" {
source = "../.."
resource_group_id = module.resource_group.resource_group_id
region = var.region
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
sm_service_plan = "trial"
sm_tags = var.resource_tags
create_iam_engine = false
}