You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,8 @@ For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-g
50
50
51
51
## Usage
52
52
53
+
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help and improve our module.
54
+
53
55
- There are several ways to deploy this in you AWS infrastructure, gathered under **[`/examples`](./examples)**
54
56
-[Single Account on ECS](#--single-account-on-ecs)
55
57
-[Single Account on AppRunner](#--single-account-on-apprunner)
@@ -58,7 +60,6 @@ For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-g
58
60
- Many module,examples and use-cases provide ways to **re-use existing resources (as optionals)** in your infrastructure (cloudtrail, ecs, vpc, k8s cluster,...)
59
61
- Find some real self-baked **use-case scenarios** under [`/use-cases`](./use-cases)
60
62
61
-
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help and improve our module.
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)| List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
97
99
| <aname="input_cloudconnector_ecr_image_uri"></a> [cloudconnector\_ecr\_image\_uri](#input\_cloudconnector\_ecr\_image\_uri)| URI to cloudconnectors image on ECR |`string`|`"public.ecr.aws/o5x4u2t4/cloud-connector:latest"`| no |
98
100
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events |`bool`|`true`| no |
99
101
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether cloudtrail delivered events to S3 should persist encrypted |`bool`|`true`| no |
100
102
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS |`string`|`"create"`| no |
103
+
| <aname="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark)| Whether to deploy or not the cloud benchmarking |`bool`|`true`| no |
101
104
| <aname="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr)| true/false whether to deploy the image scanning on ECR pushed images |`bool`|`false`| no |
102
105
| <aname="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs)| true/false whether to deploy the image scanning on ECS running images |`bool`|`false`| no |
103
106
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
Copy file name to clipboardExpand all lines: use-cases/_questionnaire.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,7 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
41
41
## Terraform Example Selection
42
42
43
43
|| Single | Organizational |
44
+
| --| -- | -- |
44
45
| Deployment Type | All Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account, but some require to be deployed on member-accounts (for Compliance and Image Scanning)
45
46
| Benefits | Will only analyse current account | Handles all accounts (managed and member)
46
47
| Drawbacks | Cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | --
0 commit comments