@@ -329,6 +329,7 @@ module "cloud_logs" {
329329 resource_group_id = module. resource_group . resource_group_id
330330 region = var. region
331331 instance_name = local. icl_name
332+ resource_tags = var. resource_tags
332333}
333334
334335resource "ibm_iam_service_id" "logs_service_id" {
@@ -355,8 +356,8 @@ resource "ibm_iam_service_policy" "logs_policy" {
355356# #######################################################################################################################
356357locals {
357358 enable_cloud_monitoring = var. cloud_monitoring_plan == " none" ? false : true
358- monitoring_name = " ${ local . prefix } - sysdig"
359- monitoring_key_name = " ${ local . prefix } - sysdig-key"
359+ monitoring_name = " ${ local . prefix } sysdig"
360+ monitoring_key_name = " ${ local . prefix } sysdig-key"
360361}
361362
362363module "cloud_monitoring" {
@@ -370,6 +371,7 @@ module "cloud_monitoring" {
370371 service_endpoints = " public-and-private"
371372 enable_platform_metrics = false
372373 manager_key_name = local. monitoring_key_name
374+ resource_tags = var. resource_tags
373375}
374376
375377
@@ -395,7 +397,7 @@ locals {
395397 " data" = {
396398 password = var.ibmcloud_api_key,
397399 username = " iamapikey" ,
398- server = " us.icr.io "
400+ server = local.container_registry
399401 }
400402 }
401403 }
@@ -460,3 +462,28 @@ module "secret" {
460462 # Issue with provider, service_access is not supported at the moment. https://github.com/IBM-Cloud/terraform-provider-ibm/issues/5232
461463 # service_access = each.value.service_access
462464}
465+
466+ # #############################################################################
467+ # Container Registry
468+ # #############################################################################
469+ locals {
470+ registry_region_result = data. external . container_registry_region . result
471+ registry = lookup (local. registry_region_result , " registry" , null )
472+ container_registry = local. registry != null ? " private.${ local . registry } " : null
473+ registry_region_error = lookup (local. registry_region_result , " error" , null )
474+
475+ # This will cause Terraform to fail if "error" is present in the external script output executed as a part of container_registry_region
476+ # tflint-ignore: terraform_unused_declarations
477+ fail_if_registry_region_error = local. registry_region_error != null ? tobool (" Registry region script failed: ${ local . registry_region_error } " ) : null
478+ }
479+
480+ # get the container registry endpoint according to the region
481+ data "external" "container_registry_region" {
482+ program = [" bash" , " ../../scripts/get-cr-region.sh" ]
483+
484+ query = {
485+ RESOURCE_GROUP_ID = module.resource_group.resource_group_id
486+ REGION = var.region
487+ IBMCLOUD_API_KEY = var.ibmcloud_api_key
488+ }
489+ }
0 commit comments