You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,6 +164,7 @@ statement instead the previous block.
164
164
| <aname="input_skip_iam_authorization_policy"></a> [skip\_iam\_authorization\_policy](#input\_skip\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits the COS instance created to read the encryption key from the KMS instance in `existing_kms_instance_guid`. WARNING: An authorization policy must exist before an encrypted bucket can be created |`bool`|`false`| no |
165
165
| <aname="input_skip_verification"></a> [skip\_verification](#input\_skip\_verification)| whether to verify the account after adding the account to cloudability. Requires cloudability\_auth\_header to be set. |`bool`|`false`| no |
166
166
| <aname="input_sysdig_crn"></a> [sysdig\_crn](#input\_sysdig\_crn)| Cloud Monitoring crn for COS bucket (Optional) |`string`|`null`| no |
167
+
| <aname="input_use_existing_iam_custom_role"></a> [use\_existing\_iam\_custom\_role](#input\_use\_existing\_iam\_custom\_role)| Whether the iam\_custom\_roles should be created or if they already exist and the they should be linked with a datasource |`bool`|`false`| no |
167
168
| <aname="input_use_existing_resource_group"></a> [use\_existing\_resource\_group](#input\_use\_existing\_resource\_group)| Whether the value of `resource_group_name` input should be a new of existing resource\_group |`bool`|`true`| no |
|[ibm_iam_roles.cos_custom_role](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/data-sources/iam_roles)| data source |
84
85
85
86
### Inputs
86
87
@@ -90,6 +91,7 @@ No modules.
90
91
| <aname="input_cloudability_custom_role_name"></a> [cloudability\_custom\_role\_name](#input\_cloudability\_custom\_role\_name)| name of the custom role created access granted to cloudability service id to read from the billing reports cos bucket |`string`|`"CloudabilityStorageCustomRole"`| no |
91
92
| <aname="input_policy_granularity"></a> [policy\_granularity](#input\_policy\_granularity)| Whether access to the cos bucket is controlled at the bucket (resource), cos instance (serviceInstance), or resource-group (resourceGroup). Note: `resource_group_id` is required in the case of the `resourceGroup`. `bucket_crn` is required otherwise. |`string`|`"resource"`| no |
92
93
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The resource group that the cos buckets are deployed in. Required if `policy_granularity` is "resource-group". Not used otherwise. |`string`|`null`| no |
94
+
| <aname="input_use_existing_iam_custom_role"></a> [use\_existing\_iam\_custom\_role](#input\_use\_existing\_iam\_custom\_role)| Whether the iam\_custom\_roles should be created or if they already exist and the they should be linked with a datasource |`bool`|`false`| no |
validate_custom_role=local.custom_role==null? (var.use_existing_iam_custom_role?tobool("Custom role `${var.cloudability_custom_role_name}` not found in a account. Found ${join(",", [forroleindata.ibm_iam_roles.cos_custom_role[0].roles:role.name])}") :tobool("Custom role name is not defined")) :null
| <aname="input_cloudability_custom_role_name"></a> [cloudability\_custom\_role\_name](#input\_cloudability\_custom\_role\_name)| name of the custom role to granting access to a cloudability service id to read the enterprise information |`string`|`"CloudabilityListAccCustomRole"`| no |
34
35
| <aname="input_enterprise_id"></a> [enterprise\_id](#input\_enterprise\_id)| Guid for the enterprise account id |`string`|`null`| no |
36
+
| <aname="input_use_existing_iam_custom_role"></a> [use\_existing\_iam\_custom\_role](#input\_use\_existing\_iam\_custom\_role)| Whether the iam\_custom\_roles should be created or if they already exist and the they should be linked with a datasource |`bool`|`false`| no |
0 commit comments