Skip to content

Commit

Permalink
chore: examples updated
Browse files Browse the repository at this point in the history
  • Loading branch information
andrecorreaneto committed Mar 20, 2024
1 parent 5fbb31f commit 5470277
Show file tree
Hide file tree
Showing 16 changed files with 16 additions and 16 deletions.
2 changes: 1 addition & 1 deletion cloud-guard/examples/external_dependency/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object.
This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/cloud-guard/). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object.

The module enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two targets. Both targets monitor compartments under *resource_ocid* compartment and are created in *resource_ocid* compartment. First target (*CLOUD-GUARD-TARGET-1*) uses Oracle provided recipes while the second one (*CLOUD-GUARD-TARGET-2*) uses cloned recipes.

Expand Down
2 changes: 1 addition & 1 deletion cloud-guard/examples/external_dependency/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" {
}

module "vision_cloud_guard" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/cloud-guard"
cloud_guard_configuration = var.cloud_guard_configuration
enable_output = true
compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null
Expand Down
2 changes: 1 addition & 1 deletion cloud-guard/examples/vision/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](../..).
This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/cloud-guard/).

It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two targets. Both targets monitor compartments under *resource_ocid* compartment and are created in *resource_ocid* compartment. First target (*CLOUD-GUARD-TARGET-1*) uses Oracle provided recipes while the second one (*CLOUD-GUARD-TARGET-2*) uses cloned recipes.

Expand Down
2 changes: 1 addition & 1 deletion cloud-guard/examples/vision/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.

module "vision_cloud_guard" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/cloud-guard"
cloud_guard_configuration = var.cloud_guard_configuration
enable_output = true
}
2 changes: 1 addition & 1 deletion security-zones/examples/external_dependency/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Security Zones in OCI using the [Security Zones module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object, specified in *oci_compartments_dependency* variable settings.
This example shows how to deploy Security Zones in OCI using the [Security Zones module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/security-zones/). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object, specified in *oci_compartments_dependency* variable settings.

It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two recipes and one security zone. The recipes are stored in the same *compartment_id*. The first recipe (*CIS-L1-RECIPE*) is a CIS level 1 recipe (*cis_level = "1"*) while the second (*CIS-L2-RECIPE*) is a CIS level 2 recipe (*cis_level = "2"*). The security zone is defined for *compartment_id* and is associated with *CIS-l1-RECIPE*. *CIS-L2-RECIPE* is not associated with a security zone.

Expand Down
2 changes: 1 addition & 1 deletion security-zones/examples/external_dependency/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" {
}

module "vision_security_zones" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/security_zones"
security_zones_configuration = var.security_zones_configuration
enable_output = true
compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null
Expand Down
2 changes: 1 addition & 1 deletion security-zones/examples/vision/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Security Zones in OCI using the [Security Zones module](../..).
This example shows how to deploy Security Zones in OCI using the [Security Zones module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/security-zones/).

It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two recipes and one security zone. The recipes are stored in the same *compartment_ocid*. The first recipe (*CIS-L1-RECIPE*) is a CIS level 1 recipe (*cis_level = "1"*) while the second (*CIS-L2-RECIPE*) is a CIS level 2 recipe (*cis_level = "2"*). The security zone is defined for *compartment_ocid* and is associated with *CIS-l1-RECIPE*. *CIS-L2-RECIPE* is not associated with a security zone.

Expand Down
2 changes: 1 addition & 1 deletion security-zones/examples/vision/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.

module "vision_security_zones" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/security_zones"
security_zones_configuration = var.security_zones_configuration
}
2 changes: 1 addition & 1 deletion vaults/examples/external_dependency/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings.
This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vaults). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings.

It defines a vault and two keys.
- The vault (*VISION-VAULT*) is created in a shared HSM partition (per module default value).
Expand Down
2 changes: 1 addition & 1 deletion vaults/examples/external_dependency/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ data "oci_objectstorage_object" "vaults" {
}

module "vision_vaults" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vaults"
providers = {
oci = oci
oci.home = oci.home
Expand Down
2 changes: 1 addition & 1 deletion vaults/examples/vision/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](../..).
This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vaults).

It defines a vault with two keys. The vault is created in a shared HSM partition. Both keys are AES 32-byte keys protected by HSM (per default values) and are created in the same compartment as the vault. The first key (*VISION-BUCKET-KEY*) is granted access by Object Storage service in Ashburn region and by *vision-appdev-admin-group* IAM group. Additionally, it has been rotated twice (per *versions* setting). The second key (*VISION-BLOCK-VOLUME-KEY*) is granted access by Block Storage service and by *vision-appdev-admin-group* IAM group. It hasn't been rotated.

Expand Down
2 changes: 1 addition & 1 deletion vaults/examples/vision/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.

module "vision_vaults" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vaults"
providers = {
oci = oci
oci.home = oci.home
Expand Down
2 changes: 1 addition & 1 deletion vss/examples/external_dependency/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings.
This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vss). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings.

It defines a host recipe (*VISION-HOST-RECIPE*), a host target (*VISION-HOST-TARGET*), a container recipe (*VISION-CONTAINER-RECIPE*) and a container target (*VISION-CONTAINER-TARGET*), all created in the same compartment defined by *default_compartment_ocid*. The example uses module defaults and only defines the minimum required attributes. *VISION-HOST-RECIPE* recipe is used by *VISION-HOST-TARGET* target, while *VISION-CONTAINER-RECIPE* recipe is used by *VISION-CONTAINER-TARGET* target.

Expand Down
2 changes: 1 addition & 1 deletion vss/examples/external_dependency/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" {
}

module "vision_scanning" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vss"
scanning_configuration = var.scanning_configuration
compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null
}
2 changes: 1 addition & 1 deletion vss/examples/vision/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](../..).
This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vss).

It defines a host recipe (*VISION-HOST-RECIPE*), a host target (*VISION-HOST-TARGET*), a container recipe (*VISION-CONTAINER-RECIPE*) and a container target (*VISION-CONTAINER-TARGET*), all created in the same compartment defined by *default_compartment_ocid*. The example uses module defaults and only defines the minimum required attributes.

Expand Down
2 changes: 1 addition & 1 deletion vss/examples/vision/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.

module "vision_scanning" {
source = "../../"
source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vss"
scanning_configuration = var.scanning_configuration
}

0 comments on commit 5470277

Please sign in to comment.