From efcaa0abc6c851c79b469c6f32fa59f857b042f9 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Mon, 6 Oct 2025 15:53:48 +0530 Subject: [PATCH 01/14] feat: next step and diagram updates --- ibm_catalog.json | 4 ++-- reference-architectures/en-fc.svg | 4 ++++ reference-architectures/en-se.svg | 4 ++++ reference-architectures/en.svg | 4 ---- 4 files changed, 10 insertions(+), 6 deletions(-) create mode 100644 reference-architectures/en-fc.svg create mode 100644 reference-architectures/en-se.svg delete mode 100644 reference-architectures/en.svg diff --git a/ibm_catalog.json b/ibm_catalog.json index 40682c96..2bd82f81 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -344,7 +344,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-se.svg", "type": "image/svg+xml" }, "description": "This deployable architecture creates and configures an IBM Cloud Event Notifications instance. It requires an Object Storage instance as part of the topology. Within this instance, an Object Storage bucket is created to store events that fail to be delivered.

By default, both the Event Notifications instance and the storage bucket are encrypted using a key management service to enhance security.

To support secure credential management, you can optionally integrate with IBM Cloud Secrets Manager to securely store Event Notifications service credentials." @@ -767,7 +767,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-fc.svg", "type": "image/svg+xml" }, "description": "This architecture supports creating and configuring an IBM Cloud Event Notifications instance.

An IBM Cloud Object Storage instance is required for this topology. Within this instance, an Object Storage bucket is created, which serves as the storage to collect events that failed delivery. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture creates the Object Storage instance. Additionally, the Event Notifications instance and storage bucket can be encrypted by using a [key management service](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-kms-2cad4789-fa90-4886-9c9e-857081c273ee-global) such as Key Protect or Hyper Protect Crypto Services to enhance security.

For monitoring needs, you can enable Cloud Monitoring for your Event Notifications instance. The [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) deployable architecture provides advanced monitoring and operational insights into the performance and health of your deployment.

Secrets Manager integration can also be enabled for writing the Event Notifications service credentials to an existing IBM Cloud Secrets Manager instance, ensuring secure management of the credentials." diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg new file mode 100644 index 00000000..e87429a6 --- /dev/null +++ b/reference-architectures/en-fc.svg @@ -0,0 +1,4 @@ + + + +
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
              [Optional] KMS
Key Ring
Key forEvent Notifications
[Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
\ No newline at end of file diff --git a/reference-architectures/en-se.svg b/reference-architectures/en-se.svg new file mode 100644 index 00000000..6b979238 --- /dev/null +++ b/reference-architectures/en-se.svg @@ -0,0 +1,4 @@ + + + +
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
KMS
Key Ring
Key for Event Notifications
[Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
\ No newline at end of file diff --git a/reference-architectures/en.svg b/reference-architectures/en.svg deleted file mode 100644 index b071b596..00000000 --- a/reference-architectures/en.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
event-notification-key
[Optional]
[Optiona...
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Text is not SVG - cannot display
\ No newline at end of file From 37e49e62613c6a0747c9309c1031b57992702c9a Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Mon, 6 Oct 2025 20:21:42 +0530 Subject: [PATCH 02/14] feat: next step and diagram updates --- solutions/fully-configurable/outputs.tf | 15 +++++++++++++++ solutions/security-enforced/outputs.tf | 15 +++++++++++++++ 2 files changed, 30 insertions(+) diff --git a/solutions/fully-configurable/outputs.tf b/solutions/fully-configurable/outputs.tf index 9fbae404..1dfbad70 100644 --- a/solutions/fully-configurable/outputs.tf +++ b/solutions/fully-configurable/outputs.tf @@ -54,3 +54,18 @@ output "event_notifications_public_endpoint" { description = "Event Notifications instance public endpoint URL" value = local.use_existing_en_instance ? null : module.event_notifications[0].event_notifications_public_endpoint } + +output "next_steps_text" { + value = "Now, you can use Event Notifications to route events for critical notifications." + description = "Next steps text" +} + +output "next_step_primary_label" { + value = "Go to Event Notifications" + description = "Primary label" +} + +output "next_step_primary_url" { + value = "https://cloud.ibm.com/services/event-notifications/${local.use_existing_en_instance ? var.existing_event_notifications_instance_crn : module.event_notifications[0].crn}" + description = "primary url" +} diff --git a/solutions/security-enforced/outputs.tf b/solutions/security-enforced/outputs.tf index 7f82152a..6630ee92 100644 --- a/solutions/security-enforced/outputs.tf +++ b/solutions/security-enforced/outputs.tf @@ -49,3 +49,18 @@ output "event_notifications_private_endpoint" { description = "Event Notifications instance private endpoint URL" value = module.event_notifications.event_notifications_private_endpoint } + +output "next_steps_text" { + value = "Now, you can use Event Notifications to route events for critical notifications." + description = "Next steps text" +} + +output "next_step_primary_label" { + value = "Go to Event Notifications" + description = "Primary label" +} + +output "next_step_primary_url" { + value = module.event_notifications.next_step_primary_url + description = "Primary URL" +} From c4ec6f472ab6ecf3e8d36f939c1a5bf478c8d454 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Mon, 6 Oct 2025 20:42:30 +0530 Subject: [PATCH 03/14] DA test --- ibm_catalog.json | 4 ++-- solutions/fully-configurable/outputs.tf | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/ibm_catalog.json b/ibm_catalog.json index 2bd82f81..9160e11b 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -344,7 +344,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-se.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-se.svg", "type": "image/svg+xml" }, "description": "This deployable architecture creates and configures an IBM Cloud Event Notifications instance. It requires an Object Storage instance as part of the topology. Within this instance, an Object Storage bucket is created to store events that fail to be delivered.

By default, both the Event Notifications instance and the storage bucket are encrypted using a key management service to enhance security.

To support secure credential management, you can optionally integrate with IBM Cloud Secrets Manager to securely store Event Notifications service credentials." @@ -767,7 +767,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-fc.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-fc.svg", "type": "image/svg+xml" }, "description": "This architecture supports creating and configuring an IBM Cloud Event Notifications instance.

An IBM Cloud Object Storage instance is required for this topology. Within this instance, an Object Storage bucket is created, which serves as the storage to collect events that failed delivery. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture creates the Object Storage instance. Additionally, the Event Notifications instance and storage bucket can be encrypted by using a [key management service](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-kms-2cad4789-fa90-4886-9c9e-857081c273ee-global) such as Key Protect or Hyper Protect Crypto Services to enhance security.

For monitoring needs, you can enable Cloud Monitoring for your Event Notifications instance. The [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) deployable architecture provides advanced monitoring and operational insights into the performance and health of your deployment.

Secrets Manager integration can also be enabled for writing the Event Notifications service credentials to an existing IBM Cloud Secrets Manager instance, ensuring secure management of the credentials." diff --git a/solutions/fully-configurable/outputs.tf b/solutions/fully-configurable/outputs.tf index 1dfbad70..b1be48fe 100644 --- a/solutions/fully-configurable/outputs.tf +++ b/solutions/fully-configurable/outputs.tf @@ -67,5 +67,5 @@ output "next_step_primary_label" { output "next_step_primary_url" { value = "https://cloud.ibm.com/services/event-notifications/${local.use_existing_en_instance ? var.existing_event_notifications_instance_crn : module.event_notifications[0].crn}" - description = "primary url" + description = "Primary URL" } From 6d43e4d0fb9cd69e036341a1c7af7e7f471ed73d Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Mon, 6 Oct 2025 22:44:54 +0530 Subject: [PATCH 04/14] feat: next step and diagram updates --- ibm_catalog.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/ibm_catalog.json b/ibm_catalog.json index 9160e11b..2bd82f81 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -344,7 +344,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-se.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-se.svg", "type": "image/svg+xml" }, "description": "This deployable architecture creates and configures an IBM Cloud Event Notifications instance. It requires an Object Storage instance as part of the topology. Within this instance, an Object Storage bucket is created to store events that fail to be delivered.

By default, both the Event Notifications instance and the storage bucket are encrypted using a key management service to enhance security.

To support secure credential management, you can optionally integrate with IBM Cloud Secrets Manager to securely store Event Notifications service credentials." @@ -767,7 +767,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-fc.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-fc.svg", "type": "image/svg+xml" }, "description": "This architecture supports creating and configuring an IBM Cloud Event Notifications instance.

An IBM Cloud Object Storage instance is required for this topology. Within this instance, an Object Storage bucket is created, which serves as the storage to collect events that failed delivery. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture creates the Object Storage instance. Additionally, the Event Notifications instance and storage bucket can be encrypted by using a [key management service](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-kms-2cad4789-fa90-4886-9c9e-857081c273ee-global) such as Key Protect or Hyper Protect Crypto Services to enhance security.

For monitoring needs, you can enable Cloud Monitoring for your Event Notifications instance. The [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) deployable architecture provides advanced monitoring and operational insights into the performance and health of your deployment.

Secrets Manager integration can also be enabled for writing the Event Notifications service credentials to an existing IBM Cloud Secrets Manager instance, ensuring secure management of the credentials." From a83169674a9de74d7344284e3f71046e35afbc8b Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 03:44:47 +0530 Subject: [PATCH 05/14] updated diagram --- reference-architectures/en-fc.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg index e87429a6..ce32514b 100644 --- a/reference-architectures/en-fc.svg +++ b/reference-architectures/en-fc.svg @@ -1,4 +1,4 @@ -
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
              [Optional] KMS
Key Ring
Key forEvent Notifications
[Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
\ No newline at end of file +
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
              [Optional] KMS
Key Ring
Key forEvent Notifications
Failed events
COS metrics
 [Optional]
Cloud Monitoring
Cloud Monitoring
Platform metrics
\ No newline at end of file From a3fba27a229ba6dd594f0bb2eb9e349b0b12074b Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 03:49:47 +0530 Subject: [PATCH 06/14] updated diagram --- reference-architectures/en-fc.svg | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg index ce32514b..94c74214 100644 --- a/reference-architectures/en-fc.svg +++ b/reference-architectures/en-fc.svg @@ -1,4 +1 @@ - - - -
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
              [Optional] KMS
Key Ring
Key forEvent Notifications
Failed events
COS metrics
 [Optional]
Cloud Monitoring
Cloud Monitoring
Platform metrics
\ No newline at end of file +
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file From 438bd06f8fbb74f5fae180aee67344b391189234 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 04:02:40 +0530 Subject: [PATCH 07/14] updated diagram --- reference-architectures/en-fc.svg | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg index 94c74214..8b5ba29b 100644 --- a/reference-architectures/en-fc.svg +++ b/reference-architectures/en-fc.svg @@ -1 +1,3 @@ -
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file + + +
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
\ No newline at end of file From 467e9525e49230166c6697566da09f62a6845dbf Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 04:06:21 +0530 Subject: [PATCH 08/14] updated diagram --- reference-architectures/en-fc.svg | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg index 8b5ba29b..e95a01a8 100644 --- a/reference-architectures/en-fc.svg +++ b/reference-architectures/en-fc.svg @@ -1,3 +1 @@ - - -
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
\ No newline at end of file +
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file From 94f46d104d1ea1b3eb07c92aefd1a072e13233e1 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 04:18:14 +0530 Subject: [PATCH 09/14] updated diagram --- reference-architectures/en-fc.svg | 2 +- reference-architectures/en-se.svg | 5 +---- solutions/fully-configurable/outputs.tf | 2 +- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/reference-architectures/en-fc.svg b/reference-architectures/en-fc.svg index e95a01a8..3c83be35 100644 --- a/reference-architectures/en-fc.svg +++ b/reference-architectures/en-fc.svg @@ -1 +1 @@ -
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file +
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
              [Optional] KMS
              [Optional] KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file diff --git a/reference-architectures/en-se.svg b/reference-architectures/en-se.svg index 6b979238..6b52ad3d 100644 --- a/reference-architectures/en-se.svg +++ b/reference-architectures/en-se.svg @@ -1,4 +1 @@ - - - -
IBM Cloud
Region
Resource GroupEvent Notifications
[Optional] Object Storage

Failed Events Bucket
KMS
Key Ring
Key for Event Notifications
[Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
\ No newline at end of file +
IBM Cloud
IBM Cloud
Region
Region
Resource GroupEvent Notifications
[Optional] Object Storage

[Optional] Object Storage
Failed Events Bucket
KMS
KMS
Key Ring
Key Ring
Key forEvent Notifications
Failed events
Failed events
COS metrics
COS metrics
 [Optional]
 [Optional]
Cloud Monitoring
Cloud Monitoring
Cloud Monitoring
Platform metrics
Platform metrics
Text is not SVG - cannot display
\ No newline at end of file diff --git a/solutions/fully-configurable/outputs.tf b/solutions/fully-configurable/outputs.tf index b1be48fe..d35ba677 100644 --- a/solutions/fully-configurable/outputs.tf +++ b/solutions/fully-configurable/outputs.tf @@ -66,6 +66,6 @@ output "next_step_primary_label" { } output "next_step_primary_url" { - value = "https://cloud.ibm.com/services/event-notifications/${local.use_existing_en_instance ? var.existing_event_notifications_instance_crn : module.event_notifications[0].crn}" + value = "https://cloud.ibm.com/services/event-notifications/${module.event_notifications[0].crn}" description = "Primary URL" } From 771340cd00ef7ed3f3646656ccd755514b652fa1 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 04:25:07 +0530 Subject: [PATCH 10/14] DA test --- ibm_catalog.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/ibm_catalog.json b/ibm_catalog.json index 2bd82f81..9160e11b 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -344,7 +344,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-se.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-se.svg", "type": "image/svg+xml" }, "description": "This deployable architecture creates and configures an IBM Cloud Event Notifications instance. It requires an Object Storage instance as part of the topology. Within this instance, an Object Storage bucket is created to store events that fail to be delivered.

By default, both the Event Notifications instance and the storage bucket are encrypted using a key management service to enhance security.

To support secure credential management, you can optionally integrate with IBM Cloud Secrets Manager to securely store Event Notifications service credentials." @@ -767,7 +767,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-fc.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-fc.svg", "type": "image/svg+xml" }, "description": "This architecture supports creating and configuring an IBM Cloud Event Notifications instance.

An IBM Cloud Object Storage instance is required for this topology. Within this instance, an Object Storage bucket is created, which serves as the storage to collect events that failed delivery. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture creates the Object Storage instance. Additionally, the Event Notifications instance and storage bucket can be encrypted by using a [key management service](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-kms-2cad4789-fa90-4886-9c9e-857081c273ee-global) such as Key Protect or Hyper Protect Crypto Services to enhance security.

For monitoring needs, you can enable Cloud Monitoring for your Event Notifications instance. The [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) deployable architecture provides advanced monitoring and operational insights into the performance and health of your deployment.

Secrets Manager integration can also be enabled for writing the Event Notifications service credentials to an existing IBM Cloud Secrets Manager instance, ensuring secure management of the credentials." From 9572223e771fc7721325ea8c6fec493edd06fb74 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 05:09:52 +0530 Subject: [PATCH 11/14] DA test --- ibm_catalog.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/ibm_catalog.json b/ibm_catalog.json index 9160e11b..92d0aded 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -203,7 +203,7 @@ { "type": "regex", "description": "The value provided for 'existing_cos_instance_crn' is not valid.", - "value": "^crn:(.*:){3}cloud-object-storage:(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" + "value": "^$|^__NULL__$|^crn:(.*:){3}cloud-object-storage:(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" } ] }, @@ -344,7 +344,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-se.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-se.svg", "type": "image/svg+xml" }, "description": "This deployable architecture creates and configures an IBM Cloud Event Notifications instance. It requires an Object Storage instance as part of the topology. Within this instance, an Object Storage bucket is created to store events that fail to be delivered.

By default, both the Event Notifications instance and the storage bucket are encrypted using a key management service to enhance security.

To support secure credential management, you can optionally integrate with IBM Cloud Secrets Manager to securely store Event Notifications service credentials." @@ -593,7 +593,7 @@ { "type": "regex", "description": "The value provided for 'existing_cos_instance_crn' is not valid.", - "value": "^crn:(.*:){3}cloud-object-storage:(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" + "value": "^$|^__NULL__$|^crn:(.*:){3}cloud-object-storage:(.*:){2}[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" } ] }, @@ -767,7 +767,7 @@ { "diagram": { "caption": "IBM Cloud Event Notifications", - "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/en-updates/reference-architectures/en-fc.svg", + "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-event-notifications/main/reference-architectures/en-fc.svg", "type": "image/svg+xml" }, "description": "This architecture supports creating and configuring an IBM Cloud Event Notifications instance.

An IBM Cloud Object Storage instance is required for this topology. Within this instance, an Object Storage bucket is created, which serves as the storage to collect events that failed delivery. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture creates the Object Storage instance. Additionally, the Event Notifications instance and storage bucket can be encrypted by using a [key management service](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-kms-2cad4789-fa90-4886-9c9e-857081c273ee-global) such as Key Protect or Hyper Protect Crypto Services to enhance security.

For monitoring needs, you can enable Cloud Monitoring for your Event Notifications instance. The [Cloud automation for Cloud Monitoring](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cloud-monitoring-73debdbf-894f-4c14-81c7-5ece3a70b67d-global) deployable architecture provides advanced monitoring and operational insights into the performance and health of your deployment.

Secrets Manager integration can also be enabled for writing the Event Notifications service credentials to an existing IBM Cloud Secrets Manager instance, ensuring secure management of the credentials." From 9216c7ab545cc0d9d3275761417a1f05201b497c Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Thu, 9 Oct 2025 05:23:00 +0530 Subject: [PATCH 12/14] DA test --- solutions/fully-configurable/outputs.tf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/solutions/fully-configurable/outputs.tf b/solutions/fully-configurable/outputs.tf index d35ba677..8e09548c 100644 --- a/solutions/fully-configurable/outputs.tf +++ b/solutions/fully-configurable/outputs.tf @@ -15,7 +15,7 @@ output "crn_list_object" { output "crn" { description = "Event Notification crn" - value = local.use_existing_en_instance ? var.existing_event_notifications_instance_crn : module.event_notifications[0].crn + value = local.eventnotification_crn } output "guid" { @@ -66,6 +66,6 @@ output "next_step_primary_label" { } output "next_step_primary_url" { - value = "https://cloud.ibm.com/services/event-notifications/${module.event_notifications[0].crn}" + value = "https://cloud.ibm.com/services/event-notifications/${local.eventnotification_crn}" description = "Primary URL" } From 4ed83ceaf73884e8f1d19ec4b50f973d85746a23 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Fri, 10 Oct 2025 12:24:25 +0530 Subject: [PATCH 13/14] updated terratest version --- tests/go.mod | 9 +++++---- tests/go.sum | 22 ++++++++++++---------- 2 files changed, 17 insertions(+), 14 deletions(-) diff --git a/tests/go.mod b/tests/go.mod index 364b6c94..d5a0a82a 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.1 require ( github.com/IBM/go-sdk-core/v5 v5.21.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.10 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.11 ) require ( @@ -16,7 +16,7 @@ require ( github.com/IBM-Cloud/power-go-client v1.12.0 // indirect github.com/IBM/cloud-databases-go-sdk v0.8.0 // indirect github.com/IBM/platform-services-go-sdk v0.86.1 // indirect - github.com/IBM/project-go-sdk v0.3.6 // indirect + github.com/IBM/project-go-sdk v0.3.9 // indirect github.com/IBM/schematics-go-sdk v0.4.0 // indirect github.com/IBM/vpc-go-sdk v1.0.2 // indirect github.com/Microsoft/go-winio v0.6.2 // indirect @@ -52,7 +52,7 @@ require ( github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 // indirect github.com/google/go-cmp v0.7.0 // indirect github.com/google/uuid v1.6.0 // indirect - github.com/gruntwork-io/terratest v0.50.0 // indirect + github.com/gruntwork-io/terratest v0.51.0 // indirect github.com/hashicorp/errwrap v1.1.0 // indirect github.com/hashicorp/go-cleanhttp v0.5.2 // indirect github.com/hashicorp/go-getter/v2 v2.2.3 // indirect @@ -90,6 +90,7 @@ require ( go.opentelemetry.io/otel v1.35.0 // indirect go.opentelemetry.io/otel/metric v1.35.0 // indirect go.opentelemetry.io/otel/trace v1.35.0 // indirect + go.yaml.in/yaml/v2 v2.4.2 // indirect golang.org/x/crypto v0.41.0 // indirect golang.org/x/mod v0.26.0 // indirect golang.org/x/net v0.42.0 // indirect @@ -100,5 +101,5 @@ require ( gopkg.in/warnings.v0 v0.1.2 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect - sigs.k8s.io/yaml v1.4.0 // indirect + sigs.k8s.io/yaml v1.6.0 // indirect ) diff --git a/tests/go.sum b/tests/go.sum index 39cc2024..f5d7b5ca 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -11,8 +11,8 @@ github.com/IBM/go-sdk-core/v5 v5.21.0 h1:DUnYhvC4SoC8T84rx5omnhY3+xcQg/Whyoa3mDP github.com/IBM/go-sdk-core/v5 v5.21.0/go.mod h1:Q3BYO6iDA2zweQPDGbNTtqft5tDcEpm6RTuqMlPcvbw= github.com/IBM/platform-services-go-sdk v0.86.1 h1:ngBpaXvUF3gmLvbU1Z4lX1wowOSYgGoKBEBaR/urt30= github.com/IBM/platform-services-go-sdk v0.86.1/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= -github.com/IBM/project-go-sdk v0.3.6 h1:DRiANKnAePevFsIKSvR89SUaMa2xsd7YKK71Ka1eqKI= -github.com/IBM/project-go-sdk v0.3.6/go.mod h1:FOJM9ihQV3EEAY6YigcWiTNfVCThtdY8bLC/nhQHFvo= +github.com/IBM/project-go-sdk v0.3.9 h1:D/UfMMn+vMQyvYf9EfocV6HrD3HcVpeIVoUSjNKuROo= +github.com/IBM/project-go-sdk v0.3.9/go.mod h1:FOJM9ihQV3EEAY6YigcWiTNfVCThtdY8bLC/nhQHFvo= github.com/IBM/schematics-go-sdk v0.4.0 h1:x01f/tPquYJYLQzJLGuxWfCbV/EdSMXRikOceNy/JLM= github.com/IBM/schematics-go-sdk v0.4.0/go.mod h1:Xe7R7xgwmXBHu09w2CbBe8lkWZaYxNQo19bS4dpLrUA= github.com/IBM/vpc-go-sdk v1.0.2 h1:WhI1Cb8atA8glUdFg0SEUh9u8afjnKHxZAj9onQBi04= @@ -147,8 +147,8 @@ github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+ github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0= github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/gruntwork-io/terratest v0.50.0 h1:AbBJ7IRCpLZ9H4HBrjeoWESITv8nLjN6/f1riMNcAsw= -github.com/gruntwork-io/terratest v0.50.0/go.mod h1:see0lbKvAqz6rvzvN2wyfuFQQG4PWcAb2yHulF6B2q4= +github.com/gruntwork-io/terratest v0.51.0 h1:RCXlCwWlHqhUoxgF6n3hvywvbvrsTXqoqt34BrnLekw= +github.com/gruntwork-io/terratest v0.51.0/go.mod h1:evZHXb8VWDgv5O5zEEwfkwMhkx9I53QR/RB11cISrpg= github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I= github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= @@ -295,8 +295,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.10 h1:dOH4lHp8/wtXDNJA2SGI2NOuMp/EDoWFw1uVWf5HJ88= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.10/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.11 h1:+ATsuqFoHUg/EWpBfF7o8wzxibSan8hG5DJV2NIgrO4= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.11/go.mod h1:9QXyZWo0MotbNavJDyeEdpTj1YKoI6IT1wOPJnI1ahI= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= @@ -331,6 +331,8 @@ go.opentelemetry.io/otel/sdk v1.29.0 h1:vkqKjk7gwhS8VaWb0POZKmIEDimRCMsopNYnriHy go.opentelemetry.io/otel/sdk v1.29.0/go.mod h1:pM8Dx5WKnvxLCb+8lG1PRNIDxu9g9b9g59Qr7hfAAok= go.opentelemetry.io/otel/trace v1.35.0 h1:dPpEfJu1sDIqruz7BHFG3c7528f6ddfSWfFDVt/xgMs= go.opentelemetry.io/otel/trace v1.35.0/go.mod h1:WUk7DtFp1Aw2MkvqGdwiXYDZZNvA/1J8o6xRXLrIkyc= +go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI= +go.yaml.in/yaml/v2 v2.4.2/go.mod h1:081UH+NErpNdqlCXm3TtEran0rJZGxAYx9hb/ELlsPU= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200302210943-78000ba7a073/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= @@ -500,8 +502,8 @@ google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2 google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw= google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= -google.golang.org/protobuf v1.35.1 h1:m3LfL6/Ca+fqnjnlqQXNpFPABW1UD7mjh8KO2mKFytA= -google.golang.org/protobuf v1.35.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE= +google.golang.org/protobuf v1.36.5 h1:tPhr+woSbjfYvY6/GPufUoYizxw1cF/yFoxJ2fmpwlM= +google.golang.org/protobuf v1.36.5/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= @@ -524,5 +526,5 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C gopkg.in/yaml.v3 v3.0.0-20200605160147-a5ece683394c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E= -sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY= +sigs.k8s.io/yaml v1.6.0 h1:G8fkbMSAFqgEFgh4b1wmtzDnioxFCUgTZhlbj5P9QYs= +sigs.k8s.io/yaml v1.6.0/go.mod h1:796bPqUfzR/0jLAl6XjHl3Ck7MiyVv8dbTdyT3/pMf4= From 50706a498a8264de27270d88251b4dbeb47494f8 Mon Sep 17 00:00:00 2001 From: Akash Kumar Date: Fri, 10 Oct 2025 18:31:52 +0530 Subject: [PATCH 14/14] fixed DA --- examples/fscloud/main.tf | 2 +- ibm_catalog.json | 13 ------------- solutions/fully-configurable/variables.tf | 4 ++-- solutions/security-enforced/main.tf | 2 +- solutions/security-enforced/outputs.tf | 4 ++-- solutions/security-enforced/variables.tf | 10 ---------- 6 files changed, 6 insertions(+), 29 deletions(-) diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 947c55c0..78924adc 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -61,7 +61,7 @@ module "cos" { kms_guid = local.kms_instance_guid kms_key_crn = var.root_key_crn skip_iam_authorization_policy = false - management_endpoint_type = "private" + management_endpoint_type = "direct" storage_class = "smart" region_location = var.region force_delete = true diff --git a/ibm_catalog.json b/ibm_catalog.json index 92d0aded..9e6994b1 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -210,19 +210,6 @@ { "key": "cos_bucket_name" }, - { - "key": "management_endpoint_type_for_bucket", - "options": [ - { - "displayname": "direct", - "value": "direct" - }, - { - "displayname": "private", - "value": "private" - } - ] - }, { "key": "skip_event_notifications_cos_auth_policy" }, diff --git a/solutions/fully-configurable/variables.tf b/solutions/fully-configurable/variables.tf index 49fe3a37..17270eed 100644 --- a/solutions/fully-configurable/variables.tf +++ b/solutions/fully-configurable/variables.tf @@ -294,11 +294,11 @@ variable "cos_bucket_region" { } variable "management_endpoint_type_for_bucket" { - description = "The type of endpoint for the IBM Terraform provider to use to manage Object Storage buckets. Available values: `public`, `private` or `direct`." + description = "The type of endpoint for the IBM Terraform provider to use to manage Object Storage buckets. Available values: `public` or `direct`." type = string default = "direct" validation { - condition = contains(["public", "private", "direct"], var.management_endpoint_type_for_bucket) + condition = contains(["public", "direct"], var.management_endpoint_type_for_bucket) error_message = "The specified `management_endpoint_type_for_bucket` is not a valid selection." } } diff --git a/solutions/security-enforced/main.tf b/solutions/security-enforced/main.tf index f7dc4691..3a3a8654 100644 --- a/solutions/security-enforced/main.tf +++ b/solutions/security-enforced/main.tf @@ -34,7 +34,7 @@ module "event_notifications" { skip_event_notifications_cos_auth_policy = var.skip_event_notifications_cos_auth_policy skip_cos_kms_auth_policy = var.skip_cos_kms_auth_policy cos_bucket_region = var.cos_bucket_region - management_endpoint_type_for_bucket = var.management_endpoint_type_for_bucket + management_endpoint_type_for_bucket = "direct" # Secrets Manager Related existing_secrets_manager_instance_crn = var.existing_secrets_manager_instance_crn existing_secrets_manager_endpoint_type = "private" diff --git a/solutions/security-enforced/outputs.tf b/solutions/security-enforced/outputs.tf index 6630ee92..4773dcf9 100644 --- a/solutions/security-enforced/outputs.tf +++ b/solutions/security-enforced/outputs.tf @@ -51,12 +51,12 @@ output "event_notifications_private_endpoint" { } output "next_steps_text" { - value = "Now, you can use Event Notifications to route events for critical notifications." + value = module.event_notifications.next_steps_text description = "Next steps text" } output "next_step_primary_label" { - value = "Go to Event Notifications" + value = module.event_notifications.next_step_primary_label description = "Primary label" } diff --git a/solutions/security-enforced/variables.tf b/solutions/security-enforced/variables.tf index c32f6c6f..50301fdd 100644 --- a/solutions/security-enforced/variables.tf +++ b/solutions/security-enforced/variables.tf @@ -180,16 +180,6 @@ variable "add_bucket_name_suffix" { default = true } -variable "management_endpoint_type_for_bucket" { - description = "The type of endpoint for the IBM Terraform provider to use to manage Object Storage buckets. Available values: `private` or `direct`." - type = string - default = "direct" - validation { - condition = contains(["private", "direct"], var.management_endpoint_type_for_bucket) - error_message = "The specified `management_endpoint_type_for_bucket` is not a valid selection." - } -} - variable "cos_bucket_access_tags" { type = list(string) description = "A list of access tags to apply to the Cloud Object Storage bucket created by the solution. For more information, [see here](https://cloud.ibm.com/docs/account?topic=account-access-tags-tutorial)."