Skip to content

Commit 7f87db4

Browse files
author
iru
committed
doc: fix EKS term for global K8S, as it's supported
1 parent 5b1a68c commit 7f87db4

File tree

6 files changed

+7
-10
lines changed

6 files changed

+7
-10
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ This would be an overall schema of the **created resources**, for the default se
143143

144144
- Cloudtrail / SNS / S3 / SQS
145145
- SSM Parameter for Sysdig API Token Storage
146-
- Sysdig Workload: ECS / AppRunner creation (EKS is pre-required, not created)
146+
- Sysdig Workload: ECS / AppRunner creation (K8s cluster is pre-required, not created)
147147
- each compute solution require a role to assume for execution
148148
- CodeBuild for on-demand image scanning
149149
- Sysdig role for [Compliance](./modules/services/cloud-bench)
@@ -217,7 +217,7 @@ Image scanning is not activated by default. Ensure you have the [required scanni
217217
- For ECR image scanning, upload any image to an ECR repository of AWS. Can find CLI instructions within the UI of AWS
218218
- For ECS running image scanning, deploy any task in your own cluster, or the one that we create to deploy our workload (ex.`amazon/amazon-ecs-sample` image).
219219

220-
It may take some time, but you should see logs detecting the new image in the ECS cloud-connector task
220+
It may take some time, but you should see logs detecting the new image in the ECS cloud-connector task
221221

222222
```
223223
{"component":"ecs-action","message":"processing detection {\"account\":\"***\",\"region\":\"eu-west-3\",\"taskDefinition\":\"apache:1\"}. source=aws_cloudtrail"}

examples-internal/organizational-k8s-threat-reuse_cloudtrail_s3/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Sysdig Secure for Cloud in AWS<br/>:: Organizational, threat-detection with pre-existing resources (EKS + cloudtrail through S3-SNS-SQS events)
1+
# Sysdig Secure for Cloud in AWS<br/>:: Organizational, threat-detection with pre-existing resources (K8S + cloudtrail through S3-SNS-SQS events)
22

33

44
- Sysdig **Helm** chart will be used to deploy threat-detection

examples/single-account-k8s/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Deploy Sysdig Secure for Cloud in a provided existing Kubernetes Cluster.
44

55
- Sysdig **Helm** [cloud-connector chart](https://charts.sysdig.com/charts/cloud-connector/) will be used to deploy threat-detection and scanning features
66
<br/>Because these charts require specific AWS credentials to be passed by parameter, a new user + access key will be created within account. See [`credentials.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-k8s/credentials.tf)
7-
- Used architecture is similar to [single-account](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account) but changing ECS <---> with an existing EKS
7+
- Used architecture is similar to [single-account](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account) but changing ECS <---> with an existing K8s cluster (EKS or vanilla)
88

99
### Notice
1010
* All the required resources and workloads will be run under the **same AWS account**. <br/><br/>
367 Bytes
Loading

examples/single-account-k8s/diagram.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,8 @@
5959
cloudtrail >> Edge(color=color_event, style="dashed") >> sns
6060

6161
with Cluster(""):
62-
eks = EKS("EKS\n(pre-existing)")
63-
with Cluster("namespace: sfc"):
62+
eks = Deployment()
63+
with Cluster("K8s Cluster\n(pre-existing)\nnamespace: sfc"):
6464
cloud_connector = Deployment("cloud-connector")
6565

6666

modules/infrastructure/permissions/org-role-eks/README.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# AWS Organizational Secure for Cloud Role for EKS
1+
# AWS Organizational Secure for Cloud Role for K8s
22

33
The aim of this module is to manage the organizational **managed account** required role and permissions for threat-detection and image scanning modules to work properly.
44

@@ -13,9 +13,6 @@ The aim of this module is to manage the organizational **managed account** requi
1313
* Enable this role to assumeRole to member accounts through the `organizational_role_per_account` role,
1414
in order to be able to fetch images that may be in member-account repositories
1515

16-
* Other permissions
17-
* ECS-Task roles (of both modules) to be able to assume this role
18-
1916

2017
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
2118
## Requirements

0 commit comments

Comments
 (0)