From 5470277d5a8887227ef52b5081e1b8506b5e7fc3 Mon Sep 17 00:00:00 2001 From: Andre Correa Date: Wed, 20 Mar 2024 12:51:19 -0300 Subject: [PATCH] chore: examples updated --- cloud-guard/examples/external_dependency/README.md | 2 +- cloud-guard/examples/external_dependency/main.tf | 2 +- cloud-guard/examples/vision/README.md | 2 +- cloud-guard/examples/vision/main.tf | 2 +- security-zones/examples/external_dependency/README.md | 2 +- security-zones/examples/external_dependency/main.tf | 2 +- security-zones/examples/vision/README.md | 2 +- security-zones/examples/vision/main.tf | 2 +- vaults/examples/external_dependency/README.md | 2 +- vaults/examples/external_dependency/main.tf | 2 +- vaults/examples/vision/README.md | 2 +- vaults/examples/vision/main.tf | 2 +- vss/examples/external_dependency/README.md | 2 +- vss/examples/external_dependency/main.tf | 2 +- vss/examples/vision/README.md | 2 +- vss/examples/vision/main.tf | 2 +- 16 files changed, 16 insertions(+), 16 deletions(-) diff --git a/cloud-guard/examples/external_dependency/README.md b/cloud-guard/examples/external_dependency/README.md index d02f1a4..be84f43 100644 --- a/cloud-guard/examples/external_dependency/README.md +++ b/cloud-guard/examples/external_dependency/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object. +This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/cloud-guard/). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object. The module enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two targets. Both targets monitor compartments under *resource_ocid* compartment and are created in *resource_ocid* compartment. First target (*CLOUD-GUARD-TARGET-1*) uses Oracle provided recipes while the second one (*CLOUD-GUARD-TARGET-2*) uses cloned recipes. diff --git a/cloud-guard/examples/external_dependency/main.tf b/cloud-guard/examples/external_dependency/main.tf index b27cd1c..f322ea1 100644 --- a/cloud-guard/examples/external_dependency/main.tf +++ b/cloud-guard/examples/external_dependency/main.tf @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" { } module "vision_cloud_guard" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/cloud-guard" cloud_guard_configuration = var.cloud_guard_configuration enable_output = true compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null diff --git a/cloud-guard/examples/vision/README.md b/cloud-guard/examples/vision/README.md index 577e837..cef562c 100644 --- a/cloud-guard/examples/vision/README.md +++ b/cloud-guard/examples/vision/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](../..). +This example shows how to deploy Cloud Guard targets in OCI using the [Cloud Guard module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/cloud-guard/). It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two targets. Both targets monitor compartments under *resource_ocid* compartment and are created in *resource_ocid* compartment. First target (*CLOUD-GUARD-TARGET-1*) uses Oracle provided recipes while the second one (*CLOUD-GUARD-TARGET-2*) uses cloned recipes. diff --git a/cloud-guard/examples/vision/main.tf b/cloud-guard/examples/vision/main.tf index 50e8afd..8b64003 100644 --- a/cloud-guard/examples/vision/main.tf +++ b/cloud-guard/examples/vision/main.tf @@ -2,7 +2,7 @@ # Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl. module "vision_cloud_guard" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/cloud-guard" cloud_guard_configuration = var.cloud_guard_configuration enable_output = true } diff --git a/security-zones/examples/external_dependency/README.md b/security-zones/examples/external_dependency/README.md index 2675054..4702ba1 100644 --- a/security-zones/examples/external_dependency/README.md +++ b/security-zones/examples/external_dependency/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Security Zones in OCI using the [Security Zones module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object, specified in *oci_compartments_dependency* variable settings. +This example shows how to deploy Security Zones in OCI using the [Security Zones module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/security-zones/). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage object, specified in *oci_compartments_dependency* variable settings. It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two recipes and one security zone. The recipes are stored in the same *compartment_id*. The first recipe (*CIS-L1-RECIPE*) is a CIS level 1 recipe (*cis_level = "1"*) while the second (*CIS-L2-RECIPE*) is a CIS level 2 recipe (*cis_level = "2"*). The security zone is defined for *compartment_id* and is associated with *CIS-l1-RECIPE*. *CIS-L2-RECIPE* is not associated with a security zone. diff --git a/security-zones/examples/external_dependency/main.tf b/security-zones/examples/external_dependency/main.tf index afaa744..57072ff 100644 --- a/security-zones/examples/external_dependency/main.tf +++ b/security-zones/examples/external_dependency/main.tf @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" { } module "vision_security_zones" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/security_zones" security_zones_configuration = var.security_zones_configuration enable_output = true compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null diff --git a/security-zones/examples/vision/README.md b/security-zones/examples/vision/README.md index 4f00f88..6b4f3a6 100644 --- a/security-zones/examples/vision/README.md +++ b/security-zones/examples/vision/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Security Zones in OCI using the [Security Zones module](../..). +This example shows how to deploy Security Zones in OCI using the [Security Zones module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/security-zones/). It enables Cloud Guard service (if not already enabled), setting Ashburn as the reporting region, and defines two recipes and one security zone. The recipes are stored in the same *compartment_ocid*. The first recipe (*CIS-L1-RECIPE*) is a CIS level 1 recipe (*cis_level = "1"*) while the second (*CIS-L2-RECIPE*) is a CIS level 2 recipe (*cis_level = "2"*). The security zone is defined for *compartment_ocid* and is associated with *CIS-l1-RECIPE*. *CIS-L2-RECIPE* is not associated with a security zone. diff --git a/security-zones/examples/vision/main.tf b/security-zones/examples/vision/main.tf index a2128e4..ab9046e 100644 --- a/security-zones/examples/vision/main.tf +++ b/security-zones/examples/vision/main.tf @@ -2,6 +2,6 @@ # Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl. module "vision_security_zones" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/security_zones" security_zones_configuration = var.security_zones_configuration } diff --git a/vaults/examples/external_dependency/README.md b/vaults/examples/external_dependency/README.md index 8708bd5..f00e15d 100644 --- a/vaults/examples/external_dependency/README.md +++ b/vaults/examples/external_dependency/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings. +This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vaults). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings. It defines a vault and two keys. - The vault (*VISION-VAULT*) is created in a shared HSM partition (per module default value). diff --git a/vaults/examples/external_dependency/main.tf b/vaults/examples/external_dependency/main.tf index 3d208ac..704600c 100644 --- a/vaults/examples/external_dependency/main.tf +++ b/vaults/examples/external_dependency/main.tf @@ -21,7 +21,7 @@ data "oci_objectstorage_object" "vaults" { } module "vision_vaults" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vaults" providers = { oci = oci oci.home = oci.home diff --git a/vaults/examples/vision/README.md b/vaults/examples/vision/README.md index 5ca596b..7e4da3b 100644 --- a/vaults/examples/vision/README.md +++ b/vaults/examples/vision/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](../..). +This example shows how to deploy Vaults and Keys in OCI using the [Vaults module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vaults). It defines a vault with two keys. The vault is created in a shared HSM partition. Both keys are AES 32-byte keys protected by HSM (per default values) and are created in the same compartment as the vault. The first key (*VISION-BUCKET-KEY*) is granted access by Object Storage service in Ashburn region and by *vision-appdev-admin-group* IAM group. Additionally, it has been rotated twice (per *versions* setting). The second key (*VISION-BLOCK-VOLUME-KEY*) is granted access by Block Storage service and by *vision-appdev-admin-group* IAM group. It hasn't been rotated. diff --git a/vaults/examples/vision/main.tf b/vaults/examples/vision/main.tf index 28bd5db..dcd42f9 100644 --- a/vaults/examples/vision/main.tf +++ b/vaults/examples/vision/main.tf @@ -2,7 +2,7 @@ # Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl. module "vision_vaults" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vaults" providers = { oci = oci oci.home = oci.home diff --git a/vss/examples/external_dependency/README.md b/vss/examples/external_dependency/README.md index 5a849c8..a1f0736 100644 --- a/vss/examples/external_dependency/README.md +++ b/vss/examples/external_dependency/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](../..). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings. +This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vss). It is functionally equivalent to [Vision example](../vision/), but it obtains its dependencies from OCI Object Storage objects, specified in *oci_compartments_dependency* and *oci_vaults_dependency* variables settings. It defines a host recipe (*VISION-HOST-RECIPE*), a host target (*VISION-HOST-TARGET*), a container recipe (*VISION-CONTAINER-RECIPE*) and a container target (*VISION-CONTAINER-TARGET*), all created in the same compartment defined by *default_compartment_ocid*. The example uses module defaults and only defines the minimum required attributes. *VISION-HOST-RECIPE* recipe is used by *VISION-HOST-TARGET* target, while *VISION-CONTAINER-RECIPE* recipe is used by *VISION-CONTAINER-TARGET* target. diff --git a/vss/examples/external_dependency/main.tf b/vss/examples/external_dependency/main.tf index 7280d48..7d29519 100644 --- a/vss/examples/external_dependency/main.tf +++ b/vss/examples/external_dependency/main.tf @@ -14,7 +14,7 @@ data "oci_objectstorage_object" "compartments" { } module "vision_scanning" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vss" scanning_configuration = var.scanning_configuration compartments_dependency = var.oci_compartments_dependency != null ? jsondecode(data.oci_objectstorage_object.compartments[0].content) : null } diff --git a/vss/examples/vision/README.md b/vss/examples/vision/README.md index 14c7c2c..a9108a9 100644 --- a/vss/examples/vision/README.md +++ b/vss/examples/vision/README.md @@ -2,7 +2,7 @@ ## Introduction -This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](../..). +This example shows how to deploy Vulnerability Scanning resources in OCI using the [VSS module](https://github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/tree/main/vss). It defines a host recipe (*VISION-HOST-RECIPE*), a host target (*VISION-HOST-TARGET*), a container recipe (*VISION-CONTAINER-RECIPE*) and a container target (*VISION-CONTAINER-TARGET*), all created in the same compartment defined by *default_compartment_ocid*. The example uses module defaults and only defines the minimum required attributes. diff --git a/vss/examples/vision/main.tf b/vss/examples/vision/main.tf index 826907a..23450eb 100644 --- a/vss/examples/vision/main.tf +++ b/vss/examples/vision/main.tf @@ -2,6 +2,6 @@ # Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl. module "vision_scanning" { - source = "../../" + source = "github.com/oracle-quickstart/terraform-oci-cis-landing-zone-security/vss" scanning_configuration = var.scanning_configuration }