You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Because these charts require specific AWS credentials to be passed by parameter, a new user + access key will be created within account. See [`credentials.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-k8s/credentials.tf)
9
-
- Used arquitecture is similar to [single-account](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account) but changing ECS <---> with an existing EKS
9
+
- Used architecture is similar to [single-account](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account) but changing ECS <---> with an existing EKS
10
10
11
11
All the required resources and workloads will be run under the same AWS account.
See [inputs summary](#inputs) or module module [`variables.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-k8s/variables.tf) file for more optional configuration.
49
53
50
54
To run this example you need have your [aws account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute:
55
+
51
56
```terraform
52
57
$ terraform init
53
58
$ terraform plan
54
59
$ terraform apply
55
60
```
56
61
57
62
Notice that:
63
+
58
64
* This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore
59
65
* All created resources will be created within the tags `product:sysdig-secure-for-cloud`, within the resource-group `sysdig-secure-for-cloud`
60
66
61
67
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no|
106
-
| <aname="input_region"></a> [region](#input\_region)| Default region for resource creation |`string`|`"eu-central-1"`| no|
107
-
| <aname="input_sysdig_secure_endpoint"></a> [sysdig\_secure\_endpoint](#input\_sysdig\_secure\_endpoint)| Sysdig Secure API endpoint |`string`|`"https://secure.sysdig.com"`| no|
| <aname="input_sysdig_secure_api_token"></a> [sysdig\_secure\_api\_token](#input\_sysdig\_secure\_api\_token)| Sysdig Secure API token |`string`| n/a |yes|
108
+
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events. testing/economization purpose. |`bool`|`true`| no |
109
+
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether s3 should be encrypted. testing/economization purpose. |`bool`|`true`| no |
110
+
| <aname="input_enable_cloud_connector"></a> [enable\_cloud\_connector](#input\_enable\_cloud\_connector)| true/false whether to provision cloud\_connector permissions |`bool`|`true`| no |
111
+
| <aname="input_enable_cloud_scanning"></a> [enable\_cloud\_scanning](#input\_enable\_cloud\_scanning)| true/false whether to provision cloud\_scanning permissions |`bool`|`true`| no |
112
+
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
113
+
| <aname="input_region"></a> [region](#input\_region)| Default region for resource creation |`string`|`"eu-central-1"`| no |
114
+
| <aname="input_sysdig_secure_endpoint"></a> [sysdig\_secure\_endpoint](#input\_sysdig\_secure\_endpoint)| Sysdig Secure API endpoint |`string`|`"https://secure.sysdig.com"`| no |
0 commit comments