You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/org-existing-cloudtrail-ecs-vpc-subnet.md
+6-20Lines changed: 6 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ module "utils_ecs-vpc" {
86
86
87
87
- General
88
88
-`AWS_REGION` Same region is to be used for both organizational managed account and Sysdig workload member account resources.
89
-
-`SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` where Sysdig Workoad is to be deployed under the pre-existing ECS
89
+
-`SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` where Sysdig Workload is to be deployed under the pre-existing ECS
90
90
91
91
- Existing Organizational Cloudtrail Setup
92
92
-`CLOUDTRAIL_SNS_ARN`
@@ -95,15 +95,6 @@ module "utils_ecs-vpc" {
95
95
- This will be required for the CloudConnector SQS Topic subscription.
96
96
- Use [`./modules/infrastructure/cloudtrail/sns_permissions.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/modules/infrastructure/cloudtrail/sns_permissions.tf#L22) as guideline
97
97
98
-
99
-
- Existing ECS Cluster Workload Setup
100
-
-`ECS_CLUSTER_NAME` ex.: "sfc"
101
-
102
-
- Existing Networking Setup
103
-
-`ECS_VPC_ID` ex.: "vpc-0e91bfef6693f296b"
104
-
-`ECS_VPC_SUBNET_PRIVATE_ID_X` Two subnets for the VPC. ex.: "subnet-0c7d803ecdc88437b"
105
-
106
-
107
98
### Terraform Manifest Snippet
108
99
109
100
```terraform
@@ -122,36 +113,31 @@ provider "sysdig" {
122
113
}
123
114
124
115
provider "aws" {
125
-
region = "<AWS_REGION>"
116
+
region = "<AWS_REGION>" # must match s3 AND sns region
126
117
}
127
118
119
+
# you can setup this provider as desired, just giving an example
128
120
provider "aws" {
129
121
alias = "member"
130
-
region = "<AWS_REGION>"
122
+
region = "<AWS_REGION>" # must match s3 AND sns region
131
123
assume_role {
132
124
# 'OrganizationAccountAccessRole' is the default role created by AWS for management-account users to be able to admin member accounts.
133
-
# if this is changed, please change to the `examples/organizational` input var `organizational_member_default_admin_role` too
0 commit comments