Skip to content

Latest commit

 

History

History
373 lines (354 loc) · 73.5 KB

VARIABLES.md

File metadata and controls

373 lines (354 loc) · 73.5 KB

Table of Contents

General

Variable Name Description Type Default Required
service_label A unique label that gets prepended to all resources deployed by the Landing Zone. Max length: 15 characters. any yes
cis_level Determines CIS OCI Benchmark Level to apply on Landing Zone managed resources. Level 1 is be practical and prudent. Level 2 is intended for environments where security is more critical than manageability and usability. Level 2 drives the creation of an OCI Vault, buckets encryption with a customer managed key, write logs for buckets and the usage of specific policies in Security Zones. string 1 no
customize_iam Whether Landing Zone IAM settings are to be customized. Customizable options are identity domains, groups, dynamic groups and policies. bool false no
define_net Whether networking is defined as part of this Landing Zone. By default, no networking resources are created. bool false no
display_output Whether to display a concise set of select resource outputs with their OCIDs and names. bool true no
extend_landing_zone_to_new_region Whether Landing Zone is being extended to another region. When set to true, compartments, groups, policies and resources at the home region are not provisioned. Use this when you want to provision a Landing Zone in a new region, but reuse existing Landing Zone resources in the home region. bool false no
lz_provenant_prefix The provenant landing zone prefix or code that identifies the client of this Landing Zone. This information goes into a freeform tag applied to all deployed resources. string core no
lz_provenant_version The provenant landing zone version. This information goes into a freeform tag applied to all deployed resources. string null no
enable_zpr Whether ZPR is enabled as part of this Landing Zone. By default, no ZPR resources are created. bool false no
zpr_namespace_name The name of ZPR security attribute namespace. string <service_label>-zpr no

Identity

Variable Name Description Type Default Required
custom_id_domain_ocid The existing identity domain OCID. string null no
deploy_exainfra_cmp Whether a separate compartment for Exadata Cloud Service Infrastructure is deployed. bool false no
dyn_groups_options IAM - Dynamic Groups string Yes no
enclosing_compartment_parent_ocid The existing compartment where Landing Zone enclosing compartment is created. string null no
existing_ag_admin_group_name The existing group to which Access Governance management policies will be granted to. list(string) [] no
existing_announcement_reader_group_name The existing group to which announcement reading policies will be granted to. list(string) [] no
existing_appdev_admin_group_name The existing group to which application management policies will be granted to. list(string) [] no
existing_appdev_fun_dyn_group_name Existing appdev dynamic group. string " no
existing_auditor_group_name The existing group to which auditing policies will be granted to. list(string) [] no
existing_compute_agent_dyn_group_name Existing compute agent dynamic group for management agent access. string " no
existing_cost_admin_group_name The existing group to which Cost management policies will be granted to. list(string) [] no
existing_cred_admin_group_name The existing group to which credentials management policies will be granted to. list(string) [] no
existing_database_admin_group_name The existing group to which database management policies will be granted to. list(string) [] no
existing_database_kms_dyn_group_name Existing database dynamic group for database to access keys. string " no
existing_enclosing_compartment_ocid The existing compartment where Landing Zone compartments (Network, Security, App, Database) are created. string null no
existing_exainfra_admin_group_name The existing group to which Exadata Cloud Service infrastructure management policies will be granted to. list(string) [] no
existing_iam_admin_group_name The existing group to which IAM management policies will be granted to. list(string) [] no
existing_id_domain_appdev_fun_dyn_group_name The existing dynamic group name in the existing identity domain for executing applications functions. string " no
existing_id_domain_compute_agent_dyn_group_name The existing dynamic group name in the existing identity domain for Compute agents. string " no
existing_id_domain_database_kms_dyn_group_name The existing dynamic group name in the existing identity domain for accessing database encryption keys. string " no
existing_id_domain_net_fw_app_dyn_group_name The existing dynamic group name in the existing identity domain for running network firewall appliances. string " no
existing_id_domain_security_fun_dyn_group_name The existing dynamic group name in the existing identity domain for executing security functions. string " no
existing_net_fw_app_dyn_group_name Existing network firewall appliance dynamic group for reading firewall instances. string " no
existing_network_admin_group_name The existing group to which network management policies will be granted to. list(string) [] no
existing_security_admin_group_name The existing group to which security management policies will be granted to. list(string) [] no
existing_security_fun_dyn_group_name Existing security dynamic group to run functions. string " no
existing_storage_admin_group_name The existing group to which Storage management policies will be granted to. list(string) [] no
groups_options Whether to deploy new groups or use existing groups. string Yes no
policies_in_root_compartment Whether policies in the Root compartment should be created or simply used. If 'CREATE', you must be sure the user executing this stack has permissions to create policies in the Root compartment. If 'USE', policies must have been created previously. string CREATE no
rm_existing_ag_admin_group_name Only applicable to RMS deployments. The existing group to which access governance policies will be granted to. string " no
rm_existing_announcement_reader_group_name Only applicable to RMS deployments. The existing group to which announcement reader policies will be granted to. string " no
rm_existing_appdev_admin_group_name Only applicable to RMS deployments. The existing group to which application management policies will be granted to. string " no
rm_existing_auditor_group_name Only applicable to RMS deployments. The existing group to which auditor policies will be granted to. string " no
rm_existing_cost_admin_group_name Only applicable to RMS deployments. The existing group to which cost management policies will be granted to. string " no
rm_existing_cred_admin_group_name Only applicable to RMS deployments. The existing group to which credentials management policies will be granted to. string " no
rm_existing_database_admin_group_name Only applicable to RMS deployments. The existing group to which database management policies will be granted to. string " no
rm_existing_exainfra_admin_group_name Only applicable to RMS deployments. The existing group to which Exadata Cloud Service infrastructure management policies will be granted to. string " no
rm_existing_iam_admin_group_name Only applicable to RMS deployments. The existing group to which IAM management policies will be granted to. string " no
rm_existing_id_domain_ag_admin_group_name The existing access governance admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_announcement_reader_group_name The existing announcement readers group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_appdev_admin_group_name The existing applications admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_auditor_group_name The existing auditor group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_cost_admin_group_name The existing cost admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_cred_admin_group_name The existing credentials admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_database_admin_group_name The existing database admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_exainfra_admin_group_name The existing Exadata CS infrastructure admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_iam_admin_group_name The existing IAM admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_network_admin_group_name The existing network admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_security_admin_group_name The existing security admin group name in the existing identity domain. list(string) [] no
rm_existing_id_domain_storage_admin_group_name The existing storage admin group name in the existing identity domain. list(string) [] no
rm_existing_network_admin_group_name Only applicable to RMS deployments. The existing group to which network management policies will be granted to. string " no
rm_existing_security_admin_group_name Only applicable to RMS deployments. The existing group to which security policies will be granted to. string " no
rm_existing_storage_admin_group_name Only applicable to RMS deployments. The existing group to which storage management policies will be granted to. string " no
use_custom_id_domain Whether to use an existing identity domain with groups and dynamic groups to grant landing zone IAM policies. If false, groups and dynamic groups from the Default identity domain are utilized. bool false no

Security

Variable Name Description Type Default Required
cloud_guard_admin_email_endpoints List of email addresses for Cloud Guard related notifications. list(string) [] no
cloud_guard_reporting_region Cloud Guard reporting region, where Cloud Guard reporting resources are kept. If not set, it defaults to home region. string null no
cloud_guard_risk_level_threshold Determines the minimum Risk level that triggers sending Cloud Guard problems to the defined Cloud Guard Email Endpoint. E.g. a setting of High will send notifications for Critical and High problems. string High no
enable_cloud_guard Determines whether the Cloud Guard service should be enabled. If true, Cloud Guard is enabled and the Root compartment is configured with a Cloud Guard target, as long as there is no pre-existing Cloud Guard target for the Root compartment (or target creation will fail). Keep in mind that once you set this to true, Cloud Guard target is managed by Landing Zone. If later on you switch this to false, the managed target is deleted and all (open, resolved and dismissed) problems associated with the deleted target are being moved to 'deleted' state. This operation happens in the background and would take some time to complete. Deleted problems can be viewed from the problems page using the 'deleted' status filter. For more details on Cloud Guard problems lifecycle, see https://docs.oracle.com/en-us/iaas/cloud-guard/using/problems-page.htm#problems-page__sect_prob_lifecycle. If Cloud Guard is already enabled and a target exists for the Root compartment, set this variable to false. bool true no
enable_cloud_guard_cloned_recipes Whether cloned recipes are attached to the managed Cloud Guard target. If false, Oracle managed recipes are attached. bool true no
enable_security_zones Determines if Security Zones are enabled in Landing Zone. When set to true, the Security Zone is enabled for the enclosing compartment. If no enclosing compartment is used, then the Security Zone is not enabled. bool false no
security_zones_reporting_region The reporting region of security zones. It defaults to tenancy home region if undefined. string `` no
sz_security_policies Additional Security Zones Policy OCIDs to add to security zone recipe (The default policies are added based on CIS level). To get a Security Zone policy OCID use the oci cli: oci cloud-guard security-policy-collection list-security-policies --compartment-id . list(string) [] no
vss_agent_cis_benchmark_settings_scan_level Valid values: STRICT, MEDIUM, LIGHTWEIGHT, NONE. STRICT: If more than 20% of the CIS benchmarks fail, then the target is assigned a risk level of Critical. MEDIUM: If more than 40% of the CIS benchmarks fail, then the target is assigned a risk level of High. LIGHTWEIGHT: If more than 80% of the CIS benchmarks fail, then the target is assigned a risk level of High. NONE: disables cis benchmark scanning. string MEDIUM no
vss_agent_scan_level Valid values: STANDARD, NONE. STANDARD enables agent-based scanning. NONE disables agent-based scanning and moots any agent related attributes. string STANDARD no
vss_create Whether Vulnerability Scanning Service recipes and targets are enabled in the Landing Zone. bool false no
vss_enable_file_scan Whether file scanning is enabled. bool false no
vss_folders_to_scan A list of folders to scan. Only applies if vss_enable_file_scan is true. Currently, the Scanning service checks for vulnerabilities only in log4j and spring4shell. list(string) [/] no
vss_port_scan_level Valid values: STANDARD, LIGHT, NONE. STANDARD checks the 1000 most common port numbers, LIGHT checks the 100 most common port numbers, NONE does not check for open ports. string STANDARD no
vss_scan_day The week day for the Vulnerability Scanning Service recipe, if enabled. Only applies if vss_scan_schedule is WEEKLY (case insensitive). string SUNDAY no
vss_scan_schedule The scan schedule for the Vulnerability Scanning Service recipe, if enabled. Valid values are WEEKLY or DAILY (case insensitive). string WEEKLY no

Three Tier Networking

Variable Name Description Type Default Required
add_tt_vcn1 Whether to add a VCN configured for three-tier workload deployments, with up to four subnets: web (public by default), application (private), database (private). An optional subnet (private by default) for bastion deployment is also available. The added VCN is labelled 'TT-VCN-1'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_tt_vcn2 Whether to add a second VCN configured for three-tier workload deployments, with up to four subnets: web (public by default), application (private), database (private). An optional subnet (private by default) for bastion deployment is also available. The added VCN is labelled 'TT-VCN-2'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_tt_vcn3 Whether to add a third VCN configured for three-tier workload deployments, with up to four subnets: web (public by default), application (private), database (private). An optional subnet (private by default) for bastion deployment is also available. The added VCN is labelled 'TT-VCN-3'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
customize_tt_vcn1_subnets If true, allows for the customization of default subnets settings. Only applicable to RMS deployments. bool false no
customize_tt_vcn2_subnets If true, allows for the customization of default subnets settings. Only applicable to RMS deployments. bool false no
customize_tt_vcn3_subnets If true, allows for the customization of default subnets settings. Only applicable to RMS deployments. bool false no
deploy_tt_vcn1_bastion_subnet Whether to deploy a subnet where you can further deploy OCI Bastion service or a jump host. bool false no
deploy_tt_vcn2_bastion_subnet Whether to deploy a subnet where you can further deploy OCI Bastion service or a jump host. bool false no
deploy_tt_vcn3_bastion_subnet Whether to deploy a subnet where you can further deploy OCI Bastion service or a jump host. bool false no
tt_vcn1_app_subnet_cidr The Application subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn1_app_subnet_dns The Application subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn1_app_subnet_name The Application subnet name. string null no
tt_vcn1_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
tt_vcn1_bastion_is_access_via_public_endpoint If true, the Bastion subnet is made public where you'd later deploy and manage your jump hosts. By default, the Bastion subnet is private, where OCI Bastion service is expected to be deployed. bool false no
tt_vcn1_bastion_subnet_allowed_cidrs List of CIDR blocks allowed to SSH into the the jump host that is eventually deployed in the public Bastion subnet. Leave it empty for no access. list(string) [] no
tt_vcn1_bastion_subnet_cidr The Bastion subnet CIDR block. A /29 block is usually enough, unless you plan on deploying a large number of jump hosts. It must be within the VCN CIDR blocks. string null no
tt_vcn1_bastion_subnet_dns The Bastion subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn1_bastion_subnet_name The Bastion subnet name. string null no
tt_vcn1_cidrs The list of CIDR blocks for the VCN. list(string) [10.0.0.0/20] no
tt_vcn1_db_subnet_cidr The Database subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn1_db_subnet_dns The Database subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn1_db_subnet_name The Database subnet name. string null no
tt_vcn1_dns The VCN DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn1_name The VCN name. If unassigned, a default name is provided. VCN label: TT-VCN-1. string null no
tt_vcn1_routable_vcns The VCN labels that this VCN can send traffic to. Leave unassigned for sending traffic to all VCNs. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no
tt_vcn1_web_subnet_cidr The Web subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn1_web_subnet_dns The Web subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn1_web_subnet_is_private Whether the Web subnet private. It is public by default. bool false no
tt_vcn1_web_subnet_name The Web subnet name. string null no
tt_vcn2_app_subnet_cidr The Application subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn2_app_subnet_dns The Application subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn2_app_subnet_name The Application subnet name. string null no
tt_vcn2_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
tt_vcn2_bastion_is_access_via_public_endpoint If true, the Bastion subnet is made public where you'd later deploy and manage your jump hosts. By default, the Bastion subnet is private, where OCI Bastion service is expected to be deployed. bool false no
tt_vcn2_bastion_subnet_allowed_cidrs List of CIDRs blocks allowed to SSH into the the jump host that is eventually deployed in the public Bastion subnet. Leave it empty for no access. list(string) [] no
tt_vcn2_bastion_subnet_cidr The Bastion subnet CIDR block. A /29 block is usually enough, unless you plan on deploying a large number of jump hosts. It must be within the VCN CIDR blocks. string null no
tt_vcn2_bastion_subnet_dns The Bastion subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn2_bastion_subnet_name The Bastion subnet name. string null no
tt_vcn2_cidrs The list of CIDR blocks for the VCN. list(string) [10.1.0.0/20] no
tt_vcn2_db_subnet_cidr The Database subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn2_db_subnet_dns The Database subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn2_db_subnet_name The Database subnet name. string null no
tt_vcn2_dns The VCN DNS Name. string null no
tt_vcn2_name The VCN name. If unassigned, a default name is provided. Label: TT-VCN-2. string null no
tt_vcn2_routable_vcns The VCN labels that this VCN can send traffic to. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-3, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no
tt_vcn2_web_subnet_cidr The Web subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn2_web_subnet_dns The Web subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn2_web_subnet_is_private Whether the Web subnet private. It is public by default. bool false no
tt_vcn2_web_subnet_name The Web subnet name. string null no
tt_vcn3_app_subnet_cidr The Application subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn3_app_subnet_dns The Application subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn3_app_subnet_name The Application subnet name. string null no
tt_vcn3_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
tt_vcn3_bastion_is_access_via_public_endpoint If true, the Bastion subnet is made public where you'd later deploy and manage your jump hosts. By default, the Bastion subnet is private, where OCI Bastion service is expected to be deployed. bool false no
tt_vcn3_bastion_subnet_allowed_cidrs List of CIDRs allowed to SSH into the the jump host that is eventually deployed in the public Bastion subnet. Leave it empty for no access. 0.0.0.0/0 is not allowed. list(string) [] no
tt_vcn3_bastion_subnet_cidr The Bastion subnet CIDR block. A /29 block is usually enough, unless you plan on deploying a large number of jump hosts. It must be within the VCN CIDR blocks. string null no
tt_vcn3_bastion_subnet_dns The Bastion subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn3_bastion_subnet_name The Bastion subnet name. string null no
tt_vcn3_cidrs The list of CIDR blocks for the VCN. list(string) [10.2.0.0/20] no
tt_vcn3_db_subnet_cidr The Database subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn3_db_subnet_dns The Database subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn3_db_subnet_name The Database subnet name. string null no
tt_vcn3_dns The VCN DNS Name. string null no
tt_vcn3_name The VCN name. If unassigned, a default name is provided. Label: TT-VCN-3. string null no
tt_vcn3_routable_vcns The VCN labels that this VCN can send traffic to. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no
tt_vcn3_web_subnet_cidr The Web subnet CIDR block. It must be within the VCN CIDR blocks. string null no
tt_vcn3_web_subnet_dns The Web subnet DNS name. Use only letters and numbers, no special characters. string null no
tt_vcn3_web_subnet_is_private Whether the Web subnet private. It is public by default. bool false no
tt_vcn3_web_subnet_name The Web subnet name. string null no

EXA Network

Variable Name Description Type Default Required
add_exa_vcn1 Whether to add a VCN configured for Exadata Cloud Service deployment, with two subnets: client (private) and backup (private). The added VCN is labelled 'EXA-VCN-1'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_exa_vcn2 Whether to add a second VCN configured for Exadata Cloud Service deployment, with two subnets: client (private) and backup (private). The added VCN is labelled 'EXA-VCN-2'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_exa_vcn3 Whether to add a third VCN configured for Exadata Cloud Service deployment, with two subnets: client (private) and backup (private). The added VCN is labelled 'EXA-VCN-3'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
exa_vcn1_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
exa_vcn1_backup_subnet_cidr The Backup subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn1_backup_subnet_dns The Backup subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn1_backup_subnet_name The Backup subnet name. string null no
exa_vcn1_cidrs The list of CIDR blocks for the VCN. list(string) [172.16.0.0/20] no
exa_vcn1_client_subnet_cidr The Client subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn1_client_subnet_dns The Client subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn1_client_subnet_name The Client subnet name. string null no
exa_vcn1_dns The VCN DNS name. string null no
exa_vcn1_name The VCN name. If unassigned, a default name is provided. VCN label: EXA-VCN-1. string null no
exa_vcn1_routable_vcns The VCN labels that this VCN can send traffic to. Leave unassigned for sending traffic to all VCNs. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no
exa_vcn2_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
exa_vcn2_backup_subnet_cidr The Backup subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn2_backup_subnet_dns The Backup subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn2_backup_subnet_name The Backup subnet name. string null no
exa_vcn2_cidrs The list of CIDR blocks for the VCN. list(string) [172.17.0.0/20] no
exa_vcn2_client_subnet_cidr The Client subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn2_client_subnet_dns The Client subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn2_client_subnet_name The Client subnet name. string null no
exa_vcn2_dns The VCN DNS name. string `` no
exa_vcn2_name The VCN name. If unassigned, a default name is provided. VCN label: EXA-VCN-2 string `` no
exa_vcn2_routable_vcns The VCN labels that this VCN can send traffic to. Leave unassigned for sending traffic to all VCNs. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN3, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no
exa_vcn3_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
exa_vcn3_backup_subnet_cidr The Backup subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn3_backup_subnet_dns The Backup subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn3_backup_subnet_name The Backup subnet name. string null no
exa_vcn3_cidrs The list of CIDR blocks for the VCN. list(string) [172.18.0.0/20] no
exa_vcn3_client_subnet_cidr The Client subnet CIDR block. It must be within the VCN CIDR blocks. string null no
exa_vcn3_client_subnet_dns The Client subnet DNS name. Use only letters and numbers, no special characters. string null no
exa_vcn3_client_subnet_name The Client subnet name. string null no
exa_vcn3_dns The VCN DNS name. string `` no
exa_vcn3_name The VCN name. If unassigned, a default name is provided. Label: EXA-VCN-3. string `` no
exa_vcn3_routable_vcns The VCN labels that this VCN can send traffic to. Leave unassigned for sending traffic to all VCNs. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN2, OKE-VCN-1, OKE-VCN-2, OKE-VCN-3. list(string) [] no

OKE Networking

Variable Name Description Type Default Required
add_oke_vcn1 Whether to add a VCN configured for OKE workload deployments, with at least three subnets: service (public by default), workers (private) and API endpoint (private). Additionally, a private subnet for pods deployment is created if the OKE CNI Type is 'Native'. You can also enable an extra private subnet for managing the OKE cluster. The added VCN is labelled 'OKE-VCN-1'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_oke_vcn1_mgmt_subnet Whether to add a private subnet for cluster management. bool false no
add_oke_vcn2 Whether to add a second VCN configured for OKE workload deployments, with at least three subnets: service (public by default), workers (private) and API endpoint (private). Additionally, a private subnet for pods deployment is created if the OKE CNI Type is 'Native'. You can also enable an extra private subnet for managing the OKE cluster. The added VCN is labelled 'OKE-VCN-2'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_oke_vcn2_mgmt_subnet Whether to add a private subnet for cluster management. bool false no
add_oke_vcn3 Whether to add a third VCN configured for OKE workload deployments, with at least three subnets: service (public by default), workers (private) and API endpoint (private). Additionally, a private subnet for pods deployment is created if the OKE CNI Type is 'Native'. You can also enable an extra private subnet for managing the OKE cluster. The added VCN is labelled 'OKE-VCN-3'. The label should be used in the '*_routable_vcns' fields of other VCNs for constraining network traffic to those respective VCNs in a Hub/Spoke topology. bool false no
add_oke_vcn3_mgmt_subnet Whether to add a private subnet for cluster management. bool false no
oke_vcn1_api_subnet_cidr The API subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn1_api_subnet_dns The API subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_api_subnet_name The API subnet name. string null no
oke_vcn1_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
oke_vcn1_cidrs The list of CIDR blocks for the VCN. list(string) [10.3.0.0/16] no
oke_vcn1_cni_type The CNI type for the OKE cluster. Valid values: 'Flannel' (default), 'Native'. If 'Native', a private subnet for pods deployment is created. string Flannel no
oke_vcn1_dns The VCN DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_mgmt_subnet_cidr The Management subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn1_mgmt_subnet_dns The Management subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_mgmt_subnet_name The Management subnet name. string null no
oke_vcn1_name The VCN name. If unassigned a default name is provided. string null no
oke_vcn1_pods_subnet_cidr The Pods subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn1_pods_subnet_dns The Pods subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_pods_subnet_name The Pods subnet name. A private subnet for pods deployment is automatically added if oke_vcn1_cni_type value is 'Native'. string null no
oke_vcn1_routable_vcns The VCN labels that this VCN can send traffic to. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-2, OKE-VCN-3. list(string) [] no
oke_vcn1_services_subnet_cidr The Services subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn1_services_subnet_dns The Services subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_services_subnet_name The Services subnet name. string null no
oke_vcn1_workers_subnet_cidr The Workers subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn1_workers_subnet_dns The Workers subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn1_workers_subnet_name The Workers subnet name. string null no
oke_vcn2_api_subnet_cidr The API subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn2_api_subnet_dns The API subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn2_api_subnet_name The API subnet name. string null no
oke_vcn2_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
oke_vcn2_cidrs The list of CIDR blocks for the VCN. list(string) [10.4.0.0/16] no
oke_vcn2_cni_type The CNI type for the OKE cluster. Valid values: 'Flannel' (default), 'Native'. If 'Native', a private subnet for pods deployment is created. string Flannel no
oke_vcn2_dns The VCN DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn2_mgmt_subnet_cidr The Management subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn2_mgmt_subnet_dns The Management subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn2_mgmt_subnet_name The Management subnet name. string null no
oke_vcn2_name The VCN name. If unassigned, a default name is provided. string null no
oke_vcn2_pods_subnet_cidr The Pods subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn2_pods_subnet_dns nan string null no
oke_vcn2_pods_subnet_name The pods subnet name. A private subnet for pods deployment is automatically added if oke_vcn2_cni_type value is 'Native'. string null no
oke_vcn2_routable_vcns The VCN labels that this VCN can send traffic to. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-3. list(string) [] no
oke_vcn2_services_subnet_cidr The Services subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn2_services_subnet_dns The Services subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn2_services_subnet_name The Services subnet name. string null no
oke_vcn2_workers_subnet_cidr The Workers subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn2_workers_subnet_dns The Workers subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn2_workers_subnet_name The Workers subnet name. string null no
oke_vcn3_api_subnet_cidr The API subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn3_api_subnet_dns The API subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_api_subnet_name The API subnet name. string null no
oke_vcn3_attach_to_drg If true, the VCN is attached to a DRG, enabling cross-vcn traffic routing. bool false no
oke_vcn3_cidrs The list of CIDR blocks for the VCN. list(string) [10.5.0.0/16] no
oke_vcn3_cni_type The CNI type for the OKE cluster. Valid values: 'Flannel' (default), 'Native'. If 'Native', a private subnet for pods deployment is created. string Flannel no
oke_vcn3_dns The VCN DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_mgmt_subnet_cidr The Management subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn3_mgmt_subnet_dns The Management subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_mgmt_subnet_name The Management subnet name. string null no
oke_vcn3_name The VCN name. If unassigned, a default name is provided. string null no
oke_vcn3_pods_subnet_cidr The Pods subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn3_pods_subnet_dns The Pods subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_pods_subnet_name The Pods subnet name. A private subnet for pods deployment is automatically added if oke_vcn3_cni_type value is 'Native'. string null no
oke_vcn3_routable_vcns The VCN labels that this VCN can send traffic to. Only applicable for Hub/Spoke topology where a DRG is deployed as the hub. Valid values: TT-VCN-1, TT-VCN-2, TT-VCN-3, EXA-VCN-1, EXA-VCN-2, EXA-VCN3, OKE-VCN-1, OKE-VCN-2. list(string) [] no
oke_vcn3_services_subnet_cidr The Services subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn3_services_subnet_dns The Services subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_services_subnet_name The Services subnet name. string null no
oke_vcn3_workers_subnet_cidr The Workers subnet CIDR block. It must be within the VCN CIDR blocks. string null no
oke_vcn3_workers_subnet_dns The Workers subnet DNS name. Use only letters and numbers, no special characters. string null no
oke_vcn3_workers_subnet_name The Workers subnet name. string null no

Hub and Spoke Networking

Variable Name Description Type Default Required
customize_hub_vcn_subnets Whether to customize default subnets settings of the Hub VCN. Only applicable to RMS deployments. bool false no
existing_drg_ocid The OCID of an existing DRG that you want to reuse for hub deployment. Only applicable if hub_deployment_option is 'VCN or on-premises connectivity routing via DRG (existing DRG)' or 'VCN or on-premises connectivity routed through DMZ VCN with Network Virtual Appliance existing DRG (DMZ VCN will be created and DRG ID required)'. string null no
enable_native_firewall_threat_log Enable OCI Native Firewall Threat Log. bool false no
enable_native_firewall_traffic_log Enable OCI Native Firewall Traffic Log. bool false no
oci_nfw_ip_ocid Enter OCI Network Firewall's Forwarding Private IP OCID. string null no
oci_nfw_policy_ocid Enter the OCI Network Firewall Policy OCID. string null no
net_appliance_boot_volume_size The boot volume size (in GB) for the network appliances. number 60 no
net_appliance_flex_shape_cpu The number of OCPUs for the selected flex shape. Applicable to flexible shapes only. number 2 no
net_appliance_flex_shape_memory The amount of memory (in GB) for the selected flex shape. Applicable to flexible shapes only. number 56 no
net_appliance_image_ocid The custom image ocid of the user-provided virtual network appliance. string null no
net_appliance_name_prefix Common prefix to network appliance name. To this common prefix, numbers 1 and 2 are appended to the corresponding instance. string net-appliance-instance no
net_appliance_public_rsa_key The SSH public key to login to Network Appliance Compute instance. string null no
net_appliance_shape The instance shape for the network appliance nodes. string VM.Optimized3.Flex no
hub_deployment_option The available options for hub deployment. Valid values: 'No cross-VCN or on-premises connectivity', 'VCN or on-premises connectivity routing via DRG (DRG will be created)', 'VCN or on-premises connectivity routing via DRG (existing DRG)', 'VCN or on-premises connectivity routing through DMZ VCN with Network Virtual Appliance (DRG and DMZ VCN will be created)', 'VCN or on-premises connectivity routed through DMZ VCN with Network Virtual Appliance existing DRG (DMZ VCN will be created and DRG ID required)'. All the VCNs that attach to the DRG join the topology as spokes. string No cross-VCN or on-premises connectivity no
hub_deployment The available options for hub deployment as an integer. 'No cross-VCN or on-premises connectivity' = 0, 'VCN or on-premises connectivity routing via DRG (DRG will be created)' = 1, 'VCN or on-premises connectivity routing via DRG (existing DRG)' = 2, 'VCN or on-premises connectivity routing through DMZ VCN with Network Virtual Appliance (DRG and DMZ VCN will be created)' = 3, 'VCN or on-premises connectivity routed through DMZ VCN with Network Virtual Appliance existing DRG (DMZ VCN will be created and DRG ID required)' = 4 number 0 no
hub_vcn_cidrs List of CIDR blocks for the Hub VCN. list(string) [192.168.0.0/26] no
hub_vcn_cidrs List of CIDR blocks for the Hub VCN. list(string) [192.168.0.0/26] no
hub_vcn_deploy_net_appliance_option The network appliance option for deploying in the Hub VCN. Valid values: 'Don't deploy any network appliance at this time' (default), 'Palo Alto Networks VM-Series Firewall', 'Fortinet FortiGate Firewall', 'User-Provided Virtual Network Appliance', and 'OCI Native Firewall'. Costs are incurred. string Don't deploy any network appliance at this time no
hub_vcn_dns The Hub VCN DNS name. string null no
hub_vcn_east_west_entry_point_ocid The OCID of a private address the Hub VCN routes traffic to for inbound internal cross-vcn traffic (East/West). This variable is to be assigned with the OCID of the indoor network load balancer's private IP address. string null no
hub_vcn_indoor_subnet_cidr The Hub VCN Indoor subnet CIDR block. It must be within the VCN CIDR blocks. string null no
hub_vcn_indoor_subnet_dns The Hub VCN Indoor subnet DNS name. Use only letters and numbers, no special characters. string null no
hub_vcn_indoor_subnet_name The Hub VCN Indoor subnet name. string null no
hub_vcn_mgmt_subnet_cidr The Hub VCN Management subnet CIDR block. It must be within the VCN CIDR blocks. string null no
hub_vcn_mgmt_subnet_dns The Hub VCN Management subnet DNS name. Use only letters and numbers, no special characters. string null no
hub_vcn_mgmt_subnet_external_allowed_cidrs_for_http List of CIDR blocks allowed to connect to Management subnet over HTTP. Leave empty for no access. list(string) [] no
hub_vcn_mgmt_subnet_external_allowed_cidrs_for_ssh List of CIDR blocks allowed to connect to Management subnet over SSH. Leave empty for no access. list(string) [] no
hub_vcn_mgmt_subnet_name The Hub VCN Management subnet Name. string null no
hub_vcn_name The Hub VCN name. string null no
hub_vcn_north_south_entry_point_ocid The OCID of a private address the Hub VCN routes traffic to for inbound external traffic (North/South). This variable is to be assigned with the OCID of the outdoor network load balancer's private IP address. string null no
hub_vcn_outdoor_subnet_cidr The Hub VCN Outdoor subnet CIDR block. It must be within the VCN CIDR blocks. string null no
hub_vcn_outdoor_subnet_dns The Hub VCN Outdoor subnet DNS name. Use only letters and numbers, no special characters. string null no
hub_vcn_outdoor_subnet_name The Hub VCN Outdoor subnet name. string null no
hub_vcn_web_subnet_cidr The Hub VCN Web subnet CIDR block. It must be within the VCN CIDR blocks. string null no
hub_vcn_web_subnet_dns The Hub VCN Web subnet DNS name. Use only letters and numbers, no special characters. string null no
hub_vcn_web_subnet_is_private Whether the Web subnet private. It is public by default. bool false no
hub_vcn_web_subnet_jump_host_allowed_cidrs List of CIDRs allowed to SSH into the Web subnet via a jump host eventually deployed in the Web subnet. Leave empty for no access. list(string) [] no
hub_vcn_web_subnet_name The Hub VCN Web subnet name. string null no
onprem_cidrs List of on-premises CIDR blocks allowed to connect to the Landing Zone network via a DRG. list(string) [] no

Monitoring

Variable Name Description Type Default Required
activate_service_connector Whether Service Connector should be activated. If true, costs my incur due to usage of Object Storage bucket, Streaming or Function. bool false no
alarm_message_format Format of the message sent by Alarms string PRETTY_JSON no
budget_admin_email_endpoints List of email addresses for all budget related notifications such as budget and finance. (Type an email address and hit enter to enter multiple values) list(string) [] no
compute_admin_email_endpoints List of email addresses for all compute related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no
create_alarms_as_enabled Whether a alarms should be created in an enabled state by default. If unchecked, alarms will be created but not emit alerts. bool false no
create_events_as_enabled Whether events should be created in an enabled state by default. If unchecked, events will be created but not emit notifications. bool false no
database_admin_email_endpoints List of email addresses for all database related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no
enable_service_connector Whether Service Connector should be enabled. If true, a single Service Connector is managed for all services log sources and the designated target specified in 'Service Connector Target Kind'. The Service Connector resource is created in INACTIVE state. To activate, check 'Activate Service Connector?' (costs may incur). bool false no
exainfra_admin_email_endpoints List of email addresses for all Exadata infrastructure related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no
existing_service_connector_bucket_key_id An existing key used to encrypt Service Connector target Object Storage bucket. string null no
existing_service_connector_bucket_vault_compartment_id An existing compartment for the vault with the key used to encrypt Service Connector target Object Storage bucket. string null no
existing_service_connector_bucket_vault_id An existing vault for the key used to encrypt Service Connector target Object Storage bucket. string null no
existing_service_connector_target_function_id An existing function to be used as the Service Connector target. Only applicable if 'service_connector_target_kind' is set to 'functions'. string null no
existing_service_connector_target_stream_id An existing stream to be used as the Service Connector target. Only applicable if 'service_connector_target_kind' is set to 'streaming'. string null no
network_admin_email_endpoints List of email addresses for all network related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no
notifications_advanced_options nan bool false no
onboard_logging_analytics Whether Logging Analytics will be enabled in the tenancy. If true, the Logging Analytics service will be enabled in the tenancy and a new Logging Analytics Namespace will be created. If false, the existing Logging Analytics namespace will be used. Only applicable if 'service_connector_target_kind' is set to 'logginganalytics'. bool false no
security_admin_email_endpoints List of email addresses for all security related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no
service_connector_target_kind Service Connector Hub target resource. Valid values are 'objectstorage', 'streaming', 'functions' or 'logginganalytics'. In case of 'objectstorage', a new bucket is created. In case of 'streaming', you can provide an existing stream ocid in 'existing_service_connector_target_stream_id' and that stream is used. If no ocid is provided, a new stream is created. In case of 'functions', you must provide the existing function ocid in 'existing_service_connector_target_function_id'. If case of 'logginganalytics', a log group for Logging Analytics service is created and the service is enabled if not already. string objectstorage no
storage_admin_email_endpoints List of email addresses for all storage related notifications. (Type an email address and hit enter to enter multiple values) list(string) [] no

Governance

Variable Name Description Type Default Required
budget_alert_email_endpoints List of email addresses for budget alerts. (Type an email address and hit enter to enter multiple values) list(string) [] no
budget_alert_threshold The threshold for triggering the alert expressed as a percentage of the monthly forecast spend. 100% is the default. number 100 no
budget_amount The amount of the budget expressed as a whole number in the currency of the customer's rate card. number 1000 no
create_budget If true, a budget is created for the enclosing compartment, based on forecast or actual spending. bool false no