Skip to content

Commit 99849d5

Browse files
author
iru
authored
Update README.md
1 parent b90d851 commit 99849d5

File tree

1 file changed

+2
-20
lines changed

1 file changed

+2
-20
lines changed

README.md

Lines changed: 2 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ It may take some time, but you should see logs detecting the new image in the EC
151151

152152
### Q-General: Getting error "Error: cannot verify credentials" on "sysdig_secure_trusted_cloud_identity" data
153153
A: This happens when Sysdig credentials are not working correctly.
154-
S: Check sysdig provider block is correctly configured with the `sysdig_secure_url` and `sysdig_secure_api_token` variables
154+
<br/>S: Check sysdig provider block is correctly configured with the `sysdig_secure_url` and `sysdig_secure_api_token` variables
155155
with the correct values. Check [Sysdig SaaS per-region URLs if required](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges)
156156

157157
### Q-General: I'm not able to see Cloud Infrastructure Entitlements Management (CIEM) results
@@ -160,7 +160,7 @@ A: Make sure you installed both [cloud-bench](https://github.com/sysdiglabs/terr
160160

161161
### Q-AWS: Getting error "Error: failed creating ECS Task Definition: ClientException: No Fargate configuration exists for given values.
162162
A: Your ECS task_size values aren't valid for Fargate. Specifically, your mem_limit value is too big for the cpu_limit you specified
163-
S: Check [supported task cpu and memory values](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-cpu-memory-error.html)
163+
<br/>S: Check [supported task cpu and memory values](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-cpu-memory-error.html)
164164

165165
### Q-AWS: Getting error "404 Invalid parameter: TopicArn" when trying to reuse an existing cloudtrail-sns
166166

@@ -204,24 +204,6 @@ This error happens when the ECS `TaskRole` has no permissions to assume this rol
204204
<br/>S: Give permissions to `sts:AssumeRole` to the role used.
205205

206206

207-
### Q-Dev-Contrib: How to iterate cloud-connector modification testing
208-
209-
A: Build a custom docker image of cloud-connector `docker build . -t <DOCKER_IMAGE> -f ./build/cloud-connector/Dockerfile` and upload it to any registry (like dockerhub).
210-
Modify the [var.image](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-connector/variables.tf) variable to point to your image and deploy
211-
212-
### Q-Dev-Contrib: How can I iterate ECS modification testing
213-
214-
A: After applying your modifications (vía terraform for example) restart the service
215-
```
216-
$ aws ecs update-service --force-new-deployment --cluster sysdig-secure-for-cloud-ecscluster --service sysdig-secure-for-cloud-cloudconnector --profile <AWS_PROFILE>
217-
```
218-
For the AWS_PROFILE, set your `~/.aws/config` to impersonate
219-
```
220-
[profile secure-for-cloud]
221-
region=eu-central-1
222-
role_arn=arn:aws:iam::<AWS_MANAGEMENT_ORGANIZATION_ACCOUNT>:role/OrganizationAccountAccessRole
223-
source_profile=<AWS_MANAGEMENT_ACCOUNT_PROFILE>
224-
```
225207

226208
<br/><br/>
227209
## Authors

0 commit comments

Comments
 (0)