Skip to content

Commit 4243037

Browse files
author
iru
authored
docs: clarify ecs address requirement
1 parent c907777 commit 4243037

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

examples/organizational/README.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,21 @@ Deploy Sysdig Secure for Cloud using an [AWS Organizational Cloudtrail](https://
3131

3232
Minimum requirements:
3333

34-
1. Have an existing AWS account as the organization management account
34+
1. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs)
35+
2. Secure requirements, as input variable value
36+
```
37+
sysdig_secure_api_token=<SECURE_API_TOKEN>
38+
```
39+
3. For ECS deployment, 2 internet facing IPv4 addresses for NAT availability. You can [re-use an existing ECS/VPC/Subnet](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs#input_ecs_cluster_name)
40+
4. Have an existing AWS account as the organization management account
3541
* Within the Organization, following services must be enabled (Organization > Services)
3642
* Organizational CloudTrail
3743
* [Organizational CloudFormation StackSets](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-enable-trusted-access.html)
38-
2. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs) for the `management` account of the organization
44+
5. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs) for the `management` account of the organization
3945
* This provider credentials must be [able to manage cloudtrail creation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html)
4046
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
4147
42-
3. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
48+
6. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
4349
4450
* The ability to pull ECR hosted images when they're allocated in a different account
4551
* The ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
@@ -50,16 +56,12 @@ Minimum requirements:
5056
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
5157
* If role name, `OrganizationAccountAccessRole` wants to be modified, it must be done both on the `aws` member-account provider AND input value `organizational_member_default_admin_role`
5258
53-
5. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
59+
7. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
5460
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
5561
This input must be provided as terraform required input value
5662
```
5763
sysdig_secure_for_cloud_member_account_id=<ORGANIZATIONAL_SECURE_FOR_CLOUD_ACCOUNT_ID>
5864
```
59-
6. **Sysdig Secure** requirements, as input variable value with the `api-token`
60-
```
61-
sysdig_secure_api_token=<SECURE_API_TOKEN>
62-
```
6365
6466
6567
## Role Summary

0 commit comments

Comments
 (0)