Skip to content

Commit 0f016b9

Browse files
author
iru
committed
ci: lint
1 parent 3ecd928 commit 0f016b9

File tree

5 files changed

+25
-25
lines changed

5 files changed

+25
-25
lines changed

use-cases/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@
55
### Feature Summary
66

77
| Cloud | Single Setup | Organizational Setup | Event Source | Compute Deployment Options | Sysdig Role Setup | Image Scanning Options | Spawned Scanning Service
8-
| -- | --- | --- | --- | --- | --- | --- | --- |
9-
| AWS | Account | Organization with member accounts | Cloudtrail | K8S `-k8s`, ECS `-ecs`, AppRunner `-apprunner` | IAM Role with Trusted Identity | ECS deployed images,<br/>ECR, Public Repositories | Codebuild project |
10-
| GCP | Project | Organization with member projects | Project/Organization Sink,<br/> GCR PubSub Topic | K8S `-k8s`, CloudRun | Workload Identity Federation | CloudRun deployed images,<br/>GCR, Public Repositories |Cloudbuild task |
8+
| -- | --- | --- | --- | --- | --- | --- | --- |
9+
| AWS | Account | Organization with member accounts | Cloudtrail | K8S `-k8s`, ECS `-ecs`, AppRunner `-apprunner` | IAM Role with Trusted Identity | ECS deployed images,<br/>ECR, Public Repositories | Codebuild project |
10+
| GCP | Project | Organization with member projects | Project/Organization Sink,<br/> GCR PubSub Topic | K8S `-k8s`, CloudRun | Workload Identity Federation | CloudRun deployed images,<br/>GCR, Public Repositories |Cloudbuild task |
1111
| Azure | Subscription | Tenant subscriptions| EventHub, Eventgrid | K8S `-k8s`, AzureContainerInstances (ACI) | Azure Lighthouse | ACI deployed images,<br/> ACR, Public Repositories | ACR Task |
1212

1313

@@ -57,7 +57,7 @@ For [complete feature installation](https://docs.sysdig.com/en/docs/sysdig-secur
5757

5858
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
5959

60-
### Unified Compliance
60+
### Unified Compliance
6161

6262
If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
6363
see [Compliance role-only deployment with Terraform](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-agentless/)

use-cases/manual-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ To enable [CSPM (Compliance)](https://docs.sysdig.com/en/docs/sysdig-secure/post
55
- An `account` representing the AWS account for which you want to enable CSPM
66
- A trust-relationship `component` that represents the IAM Role in your AWS account
77
- A CSPM `feature` that indicates CSPM scans should be run against this account
8-
8+
99

1010
## Guidelines
1111

use-cases/manual-org-three-way.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This setup will provide the following [Sysdig Secure for Cloud](https://docs.sys
4242

4343
- AWS member account for Compliance
4444

45-
- Sysdig Compliance Role:`aws:SecurityAudit policy`.
45+
- Sysdig Compliance Role:`aws:SecurityAudit policy`.
4646

4747
For more information, see [Creating IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html).
4848

use-cases/multiple-accounts-k8s-threat.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The ingestor processes a single SQS AWS queue with the events reported from:
5151
1. Define different **AWS providers**:
5252

5353
WIP.
54-
54+
5555
- We need to know the account where Sysdig Secure for cloud workload will be deployed
5656
- And the accounts where the cloudtrail-S3 bucket(s) will be
5757
<!--
@@ -66,7 +66,7 @@ The ingestor processes a single SQS AWS queue with the events reported from:
6666
region = "<REGION>"
6767
...
6868
}
69-
69+
7070
provider "aws" {
7171
alias = "sfc"
7272
region = "<REGION>"
@@ -158,72 +158,72 @@ The ingestor processes a single SQS AWS queue with the events reported from:
158158
159159
```yaml
160160
resource "helm_release" "cloud_connector" {
161-
161+
162162
provider = helm
163-
163+
164164
name = "cloud-connector"
165-
165+
166166
repository = "https://charts.sysdig.com"
167167
chart = "cloud-connector"
168-
168+
169169
create_namespace = true
170170
namespace = "sysdig"
171-
171+
172172
set {
173173
name = "image.pullPolicy"
174174
value = "Always"
175175
}
176-
176+
177177
set {
178178
name = "sysdig.url"
179179
value = "<sysdig_secure_url>"
180180
}
181-
181+
182182
set_sensitive {
183183
name = "sysdig.secureAPIToken"
184184
value = "<SYSDIG_SECURE_API_TOKEN>"
185185
}
186-
186+
187187
set_sensitive {
188188
name = "aws.accessKeyId"
189189
value = "<AWS_ACCESS_KEY>"
190190
}
191-
191+
192192
set_sensitive {
193193
name = "aws.secretAccessKey"
194194
value = "<AWS_SECRET_ACCESS_KEY>"
195195
}
196-
196+
197197
set {
198198
name = "aws.region"
199199
value = "<REGION>"
200200
}
201-
201+
202202
set {
203203
name = "nodeSelector.<NODE_SELECTOR_LABEL>"
204204
value = "<NODE_SELECTOR_LABEL_VALUE>"
205205
}
206-
206+
207207
set {
208208
name = "tolerations[0].key"
209209
value = "<TOLERATION_KEY>"
210210
}
211-
211+
212212
set {
213213
name = "tolerations[0].operator"
214214
value = "<TOLERATION_OPERATOR>"
215215
}
216-
216+
217217
set {
218218
name = "tolerations[0].value"
219219
value = "<TOLERATION_VALUE>"
220220
}
221-
221+
222222
set {
223223
name = "tolerations[0].effect"
224224
value = "<TOLERATION_EFFECT>"
225225
}
226-
226+
227227
values = [
228228
<<CONFIG
229229
logging: info

use-cases/org-three-way-ecs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## Overview
44

5-
This use case covers securing a multi-account AWS environment with workload on ECS, typically created with the [AWS ControlTower landing zone](https://aws.amazon.com/controltower/features/).
5+
This use case covers securing a multi-account AWS environment with workload on ECS, typically created with the [AWS ControlTower landing zone](https://aws.amazon.com/controltower/features/).
66

77
The guidelines are terraform-based. For instruction on setting up Secure for Cloud manually, see [Manual Organizational Setup - Three-Way Cross-Account](./manual-org-three-way.md).
88

0 commit comments

Comments
 (0)