Skip to content

Commit 2d22ae0

Browse files
author
iru
authored
docs: reorganize readme use-case
1 parent 04f7161 commit 2d22ae0

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

use-cases/README.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
1-
# Secure for Cloud Use Cases for AWS Environments
2-
3-
Secure for cloud is installed in AWS either by using [terraform](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud) or by using a [Cloudformation](https://github.com/sysdiglabs/aws-templates-secure-for-cloud) template.
1+
# Secure for Cloud Use Cases
42

3+
## General; AWS, GCP and Azure
54

65
### Feature Summary
76

@@ -13,13 +12,13 @@ Secure for cloud is installed in AWS either by using [terraform](https://github.
1312

1413

1514

16-
## Which Compute Deployment Should I Choose?
15+
#### Which Compute Deployment Should I Choose?
1716

1817
There are no preffered way, just take a technology you're familiar with. Otherwise, prefer non-K8S, as it will be harder to maintain.
1918
For AWS, beware of [AppRunner region limitations](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-apprunner/README.md#prerequisites).
2019

2120

22-
## Available Options
21+
### Pre-Existing Resource Usage
2322

2423
Make use of optionals to reuse pre-existing resources and prevent incurring in more costs.
2524

@@ -32,14 +31,21 @@ Make use of optionals to reuse pre-existing resources and prevent incurring in m
3231
| | ACR | `registry_name`, `registry_resource_group_name` | - |
3332
| * | Compute Workload | - | All clouds allow Sysdig Secure for cloud to be deployed on a pre-existing K8S cluster|
3433

35-
## Overview
34+
### Overview
3635

3736
Current examples were developed for simple scenarios.
3837
As new use cases emerge, we will establish a standard scenario and create new examples to accommodate additional requirements.
3938
Check the current list of use cases or use the [questionnaire](./_questionnaire.md) to let us know your needs.
4039

4140
If Terraform or Cloudformation suits your purpose, take a look at the `manual-*` prefixed use cases.
4241

42+
43+
<br/><br/>
44+
## AWS-Specific
45+
46+
Secure for cloud is installed in AWS either by using [terraform](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud) or by using a [Cloudformation](https://github.com/sysdiglabs/aws-templates-secure-for-cloud) template.
47+
48+
4349
### Features
4450

4551
For [complete feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features), check
@@ -50,7 +56,7 @@ For [complete feature installation](https://docs.sysdig.com/en/docs/sysdig-secur
5056
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for cloudtrail-s3 event access |
5157
| Target | will only analyse current account | handles all accounts (managed and member) + dynamically created new member accounts|
5258
| Drawbacks | cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | for scanning, a per-member-account access role is required |
53-
| Optional resources usage limitations | - | For organizational example, Cloudtrail resources cloudtrail-s3 and cloudtrail-sns, must exist in the management account. For other setups check other alternative use-cases</br><ul><li>[AWS manual deployment; cloudtrail-s3 bucket in another member account](./manual-org-three-way.md)</li><li>[AWS terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. k8s flavor](./org-three-way-k8s.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. ecs flavor](./org-three-way-ecs.md)</li></ul>|
59+
| Optional resources usage limitations | - | For organizational example, Cloudtrail resources cloudtrail-s3 and cloudtrail-sns, must exist in the management account. For other setups check other alternative use-cases</br><ul><li>[manual deployment; cloudtrail-s3 bucket in another member account](./manual-org-three-way.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. k8s flavor](./org-three-way-k8s.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. ecs flavor](./org-three-way-ecs.md)</li><li>[terraform-based; re-use ecs/vpc/subnet](./org-existing-cloudtrail-ecs-vpc-subnet.md)</li></ul>|
5460
| More Info | [AWS single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [AWS single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [AWS single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s) | [AWS organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational) |
5561

5662
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.

0 commit comments

Comments
 (0)