🕸️ This repo is no longer maintained and is archived. Use one of the following public modules if you consume the module from GitHub:
- terraform-ibm-key-protect-all-inclusive
- terraform-ibm-key-protect
- terraform-ibm-kms-key
- terraform-ibm-kms-key-ring
❗ Important: This module will be deleted from the Hashicorp registry on 1 August 2023.
If you consume the module from the Hashicorp registry, use of the following instead:
Following terraform modules are used to create and work with IBM Key Management Service
module "kms_key" {
source = "../../modules/key-protect"
is_kp_instance_exist = false
resource_group_id = data.ibm_resource_group.resource_group.id
service_name = var.service_name
location = var.location
plan = "tiered-pricing"
tags = var.tags
allowed_network_policy = var.allowed_network_policy
key_name = var.key_name
standard_key_type = var.standard_key_type
force_delete = var.force_delete
network_access_allowed = var.network_access_allowed
}
Name | Version |
---|---|
terraform | >= 1.0.0 |
ibm | 1.41.1 |
No modules.
No resources.
No inputs.
No outputs.
You can report issues and request features for this module in the terraform-ibm-issue-tracker repo. See Report an issue or request a feature.
To set up your local development environment, see Local development setup in the project documentation.