Skip to content

Commit 053e2a8

Browse files
hayk99iru
andauthored
chore: fix precommit hook (#83)
* chore: fix precommit hookv * ci: trigger precommit with MD files * chore: fix missing paramters * ci: trigger precommit with MD files on PR * ci: trigger precommit with MD files on PR * fix: precommit * chore: restore deleted files * ci: clean precommit cache before run * chore: pre-commit validate cleanup Co-authored-by: iru <irune.prado@sysdig.com>
1 parent 3adc3fe commit 053e2a8

File tree

23 files changed

+106
-92
lines changed

23 files changed

+106
-92
lines changed

.github/workflows/ci-pull-request.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,14 @@ on:
44
pull_request:
55
paths:
66
- '**.tf'
7+
- '**.md'
78
- '.pre-commit-config.yaml'
89
push:
910
branches:
1011
- master
1112
paths:
1213
- '**.tf'
14+
- '**.md'
1315
env:
1416
GO_VERSION: "^1.17"
1517

@@ -116,6 +118,8 @@ jobs:
116118
pip install pre-commit
117119
go install github.com/terraform-docs/terraform-docs@v0.16.0
118120
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
121+
- name: Clean pre-commit cache
122+
run: pre-commit clean
119123
- name: Execute pre-commit
120124
# Run all pre-commit checks on max version supported
121125
if: ${{ matrix.version == needs.getTerraformMinMaxVersion.outputs.maxVersion }}

.pre-commit-config.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,15 @@ repos:
2121
# language: script
2222
# verbose: true
2323

24+
# https://github.com/antonbabenko/pre-commit-terraform/blob/master/README.md#terraform_validate (point 4)
25+
- repo: local
26+
hooks:
27+
- id: terraform_clean
28+
name: "Terraform Cleanup"
29+
pass_filenames: false
30+
language: system
31+
entry: bash -c "find . \( -iname ".terraform*" ! -iname ".terraform-docs*" ! -path "*/test/*" \) -print0 | xargs -0 rm -r; true"
32+
2433
- repo: https://github.com/antonbabenko/pre-commit-terraform
2534
rev: v1.64.0
2635
hooks:

CONTRIBUTE.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@ We're using **pre-commit** | https://pre-commit.com
5555
- custom configuration | https://github.com/sysdiglabs/terraform-google-secure-for-cloud/blob/master/.pre-commit-config.yaml
5656
- current `terraform-docs` version, requires developer to create `README.md` file, with the enclosure tags for docs to insert the automated content
5757
```markdown
58-
<!-- BEGIN_TF_DOCS -->
59-
<!-- END_TF_DOCS -->
58+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
59+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
6060
```
6161

6262
- If pre-commit fails on Github but not on your local, try cleaning-up `terraform` files with

examples-internal/organizational-k8s-threat-reuse_cloudtrail_s3/README.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -82,21 +82,23 @@ $ terraform plan
8282
$ terraform apply
8383
```
8484

85-
<!-- BEGIN_TF_DOCS -->
85+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
8686
## Requirements
8787

8888
| Name | Version |
8989
|------|---------|
9090
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.15.0 |
9191
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.50.0 |
9292
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | >=2.3.0 |
93+
| <a name="requirement_sysdig"></a> [sysdig](#requirement\_sysdig) | >= 0.5.33 |
9394

9495
## Providers
9596

9697
| Name | Version |
9798
|------|---------|
98-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.1.0 |
99-
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.4.1 |
99+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.50.0 |
100+
| <a name="provider_helm"></a> [helm](#provider\_helm) | >=2.3.0 |
101+
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | >= 0.5.33 |
100102

101103
## Modules
102104

@@ -111,6 +113,7 @@ $ terraform apply
111113
|------|------|
112114
| [helm_release.cloud_connector](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
113115
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
116+
| [sysdig_secure_connection.current](https://registry.terraform.io/providers/sysdiglabs/sysdig/latest/docs/data-sources/secure_connection) | data source |
114117

115118
## Inputs
116119

@@ -119,15 +122,13 @@ $ terraform apply
119122
| <a name="input_aws_access_key_id"></a> [aws\_access\_key\_id](#input\_aws\_access\_key\_id) | cloud-connector. aws credentials in order to access required aws resources. aws.accessKeyId | `string` | n/a | yes |
120123
| <a name="input_aws_secret_access_key"></a> [aws\_secret\_access\_key](#input\_aws\_secret\_access\_key) | cloud-connector. aws credentials in order to access required aws resources. aws.secretAccessKey | `string` | n/a | yes |
121124
| <a name="input_cloudtrail_s3_sns_sqs_url"></a> [cloudtrail\_s3\_sns\_sqs\_url](#input\_cloudtrail\_s3\_sns\_sqs\_url) | Organization cloudtrail event notification S3-SNS-SQS URL to listen to | `string` | n/a | yes |
122-
| <a name="input_sysdig_secure_api_token"></a> [sysdig\_secure\_api\_token](#input\_sysdig\_secure\_api\_token) | Sysdig Secure API token | `string` | n/a | yes |
123125
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
124-
| <a name="input_sysdig_secure_url"></a> [sysdig\_secure\_endpoint](#input\_sysdig\_secure\_endpoint) | Sysdig Secure API endpoint | `string` | `"https://secure.sysdig.com"` | no |
125-
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
126+
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
126127

127128
## Outputs
128129

129130
No outputs.
130-
<!-- END_TF_DOCS -->
131+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
131132

132133

133134
## Troubleshooting

examples/organizational/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ $ terraform apply
126126
```
127127

128128

129-
<!-- BEGIN_TF_DOCS -->
129+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
130130
## Requirements
131131

132132
| Name | Version |
@@ -139,8 +139,8 @@ $ terraform apply
139139

140140
| Name | Version |
141141
|------|---------|
142-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.1.0 |
143-
| <a name="provider_aws.member"></a> [aws.member](#provider\_aws.member) | 4.1.0 |
142+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.0.0 |
143+
| <a name="provider_aws.member"></a> [aws.member](#provider\_aws.member) | >= 4.0.0 |
144144
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | >= 0.5.33 |
145145

146146
## Modules
@@ -175,7 +175,7 @@ $ terraform apply
175175
| <a name="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail) | true/false whether cloudtrail will ingest multiregional events. testing/economization purpose. | `bool` | `true` | no |
176176
| <a name="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether cloudtrail delivered events to S3 should persist encrypted | `bool` | `true` | no |
177177
| <a name="input_cloudtrail_s3_arn"></a> [cloudtrail\_s3\_arn](#input\_cloudtrail\_s3\_arn) | ARN of a pre-existing cloudtrail\_sns s3 bucket. Used together with `cloudtrail_sns_arn`, `cloudtrail_s3_arn`. If it does not exist, it will be inferred from create cloudtrail | `string` | `"create"` | no |
178-
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. Used together with `cloudtrail_sns_arn`, `cloudtrail_s3_arn`. If it does not exist, it will be inferred from created cloudtrail. Providing an ARN requires permisision to SNS:Subscribe, check ./modules/infrastructure/cloudtrail/sns\_permissions.tf block | `string` | `"create"` | no |
178+
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. Used together with `cloudtrail_sns_arn`, `cloudtrail_s3_arn`. If it does not exist, it will be inferred from created cloudtrail. Providing an ARN requires permission to SNS:Subscribe, check ./modules/infrastructure/cloudtrail/sns\_permissions.tf block | `string` | `"create"` | no |
179179
| <a name="input_connector_ecs_task_role_name"></a> [connector\_ecs\_task\_role\_name](#input\_connector\_ecs\_task\_role\_name) | Name for the ecs task role. This is only required to resolve cyclic dependency with organizational approach | `string` | `"organizational-ECSTaskRole"` | no |
180180
| <a name="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no |
181181
| <a name="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr) | true/false whether to deploy the image scanning on ECR pushed images | `bool` | `true` | no |
@@ -188,12 +188,12 @@ $ terraform apply
188188
| <a name="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids) | List of VPC subnets where workload is to be deployed. Defaulted to be created when `ecs_cluster_name is not provided.` | `list(string)` | `[]` | no |
189189
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
190190
| <a name="input_organizational_member_default_admin_role"></a> [organizational\_member\_default\_admin\_role](#input\_organizational\_member\_default\_admin\_role) | Default role created by AWS for management-account users to be able to admin member accounts.<br/>https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html | `string` | `"OrganizationAccountAccessRole"` | no |
191-
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
191+
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
192192

193193
## Outputs
194194

195195
No outputs.
196-
<!-- END_TF_DOCS -->
196+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
197197

198198
## Authors
199199

examples/single-account-k8s/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ $ terraform apply
7171
```
7272

7373

74-
<!-- BEGIN_TF_DOCS -->
74+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
7575
## Requirements
7676

7777
| Name | Version |
@@ -85,9 +85,9 @@ $ terraform apply
8585

8686
| Name | Version |
8787
|------|---------|
88-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.1.0 |
89-
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.4.1 |
90-
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | >= 0.5.33 |
88+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.10.0 |
89+
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.5.1 |
90+
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | 0.5.36 |
9191

9292
## Modules
9393

@@ -116,17 +116,17 @@ $ terraform apply
116116
| <a name="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions) | List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. | `list(string)` | `[]` | no |
117117
| <a name="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail) | true/false whether cloudtrail will ingest multiregional events. testing/economization purpose. | `bool` | `true` | no |
118118
| <a name="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether s3 should be encrypted. testing/economization purpose. | `bool` | `true` | no |
119-
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If it does not exist, it will be inferred from created cloudtrail | `string` | `"create"` | no |
119+
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region | `string` | `"create"` | no |
120120
| <a name="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no |
121121
| <a name="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr) | true/false whether to deploy the image scanning on ECR pushed images | `bool` | `true` | no |
122122
| <a name="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs) | true/false whether to deploy the image scanning on ECS running images | `bool` | `true` | no |
123123
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
124-
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
124+
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
125125

126126
## Outputs
127127

128128
No outputs.
129-
<!-- END_TF_DOCS -->
129+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
130130

131131

132132
## Authors

examples/single-account/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ $ terraform plan
5757
$ terraform apply
5858
```
5959

60-
<!-- BEGIN_TF_DOCS -->
60+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
6161
## Requirements
6262

6363
| Name | Version |
@@ -70,7 +70,7 @@ $ terraform apply
7070

7171
| Name | Version |
7272
|------|---------|
73-
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | >= 0.5.33 |
73+
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | 0.5.36 |
7474

7575
## Modules
7676

@@ -97,7 +97,7 @@ $ terraform apply
9797
| <a name="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions) | List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. | `list(string)` | `[]` | no |
9898
| <a name="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail) | true/false whether cloudtrail will ingest multiregional events | `bool` | `true` | no |
9999
| <a name="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether cloudtrail delivered events to S3 should persist encrypted | `bool` | `true` | no |
100-
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created | `string` | `"create"` | no |
100+
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region | `string` | `"create"` | no |
101101
| <a name="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no |
102102
| <a name="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr) | true/false whether to deploy the image scanning on ECR pushed images | `bool` | `true` | no |
103103
| <a name="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs) | true/false whether to deploy the image scanning on ECS running images | `bool` | `true` | no |
@@ -108,14 +108,14 @@ $ terraform apply
108108
| <a name="input_ecs_vpc_region_azs"></a> [ecs\_vpc\_region\_azs](#input\_ecs\_vpc\_region\_azs) | List of Availability Zones for ECS VPC creation. e.g.: ["apne1-az1", "apne1-az2"]. If defaulted, two of the default 'aws\_availability\_zones' datasource will be taken | `list(string)` | `[]` | no |
109109
| <a name="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids) | List of VPC subnets where workload is to be deployed. Defaulted to be created when 'ecs\_cluster\_name' is not provided. | `list(string)` | `[]` | no |
110110
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
111-
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
111+
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
112112

113113
## Outputs
114114

115115
| Name | Description |
116116
|------|-------------|
117117
| <a name="output_cloudtrail_sns_topic_arn"></a> [cloudtrail\_sns\_topic\_arn](#output\_cloudtrail\_sns\_topic\_arn) | ARN of cloudtrail\_sns topic |
118-
<!-- END_TF_DOCS -->
118+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
119119

120120

121121
## Authors

examples/trigger-events/README.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ $ terraform plan
3737
$ terraform apply
3838
```
3939

40-
<!-- BEGIN_TF_DOCS -->
40+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
4141
## Requirements
4242

4343
| Name | Version |
@@ -49,8 +49,7 @@ $ terraform apply
4949

5050
| Name | Version |
5151
|------|---------|
52-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.50.0 |
53-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.1.0 |
52+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.10.0 |
5453

5554
## Modules
5655

@@ -70,7 +69,7 @@ No inputs.
7069
## Outputs
7170

7271
No outputs.
73-
<!-- END_TF_DOCS -->
72+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
7473

7574

7675
## Authors

modules/infrastructure/cloudtrail/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# AWS Organizational CloudTrail deployment module
22

3-
<!-- BEGIN_TF_DOCS -->
3+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
44
## Requirements
55

66
| Name | Version |
@@ -12,7 +12,7 @@
1212

1313
| Name | Version |
1414
|------|---------|
15-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.0.0 |
15+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.10.0 |
1616

1717
## Modules
1818

@@ -47,15 +47,15 @@ No modules.
4747
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
4848
| <a name="input_organizational_config"></a> [organizational\_config](#input\_organizational\_config) | organizational\_config. following attributes must be given<br><ul><li>`sysdig_secure_for_cloud_member_account_id` to enable reading permission</li><br><li>`organizational_role_per_account` to enable SNS topic subscription. by default "OrganizationAccountAccessRole"</li></ul> | <pre>object({<br> sysdig_secure_for_cloud_member_account_id = string<br> organizational_role_per_account = string<br> })</pre> | <pre>{<br> "organizational_role_per_account": null,<br> "sysdig_secure_for_cloud_member_account_id": null<br>}</pre> | no |
4949
| <a name="input_s3_bucket_expiration_days"></a> [s3\_bucket\_expiration\_days](#input\_s3\_bucket\_expiration\_days) | Number of days that the logs will persist in the bucket | `number` | `5` | no |
50-
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
50+
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
5151

5252
## Outputs
5353

5454
| Name | Description |
5555
|------|-------------|
5656
| <a name="output_s3_bucket_arn"></a> [s3\_bucket\_arn](#output\_s3\_bucket\_arn) | ARN of Cloudtrail SNS topic |
5757
| <a name="output_sns_topic_arn"></a> [sns\_topic\_arn](#output\_sns\_topic\_arn) | ARN of Cloudtrail SNS topic |
58-
<!-- END_TF_DOCS -->
58+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
5959

6060
## Authors
6161

0 commit comments

Comments
 (0)