You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)|List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
98
+
| <aname="input_cloudconnector_ecr_image_uri"></a> [cloudconnector\_ecr\_image\_uri](#input\_cloudconnector\_ecr\_image\_uri)|URI to cloudconnectors image on ECR |`string`|`"public.ecr.aws/o5x4u2t4/cloud-connector:latest"`| no |
101
99
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events |`bool`|`true`| no |
102
100
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether cloudtrail delivered events to S3 should persist encrypted |`bool`|`true`| no |
103
-
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created |`string`|`"create"`| no |
104
-
| <aname="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark)| Whether to deploy or not the cloud benchmarking |`bool`|`true`| no |
101
+
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS |`string`|`"create"`| no |
105
102
| <aname="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr)| true/false whether to deploy the image scanning on ECR pushed images |`bool`|`true`| no |
106
103
| <aname="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs)| true/false whether to deploy the image scanning on ECS running images |`bool`|`true`| no |
107
-
| <aname="input_ecs_cluster_name"></a> [ecs\_cluster\_name](#input\_ecs\_cluster\_name)| Name of a pre-existing ECS (elastic container service) cluster. If defaulted, a new ECS cluster/VPC/Security Group will be created |`string`|`"create"`| no |
108
-
| <aname="input_ecs_task_cpu"></a> [ecs\_task\_cpu](#input\_ecs\_task\_cpu)| Amount of CPU (in CPU units) to reserve for cloud-connector task |`string`|`"256"`| no |
109
-
| <aname="input_ecs_task_memory"></a> [ecs\_task\_memory](#input\_ecs\_task\_memory)| Amount of memory (in megabytes) to reserve for cloud-connector task |`string`|`"512"`| no |
110
-
| <aname="input_ecs_vpc_id"></a> [ecs\_vpc\_id](#input\_ecs\_vpc\_id)| ID of the VPC where the workload is to be deployed. Defaulted to be created when 'ecs\_cluster\_name' is not provided. |`string`|`"create"`| no |
111
-
| <aname="input_ecs_vpc_region_azs"></a> [ecs\_vpc\_region\_azs](#input\_ecs\_vpc\_region\_azs)| List of Availability Zones for ECS VPC creation. e.g.: ["apne1-az1", "apne1-az2"]. If defaulted, two of the default 'aws\_availability\_zones' datasource will be taken |`list(string)`|`[]`| no |
112
-
| <aname="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids)| List of VPC subnets where workload is to be deployed. Defaulted to be created when 'ecs\_cluster\_name' is not provided. |`list(string)`|`[]`| no |
113
104
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
Copy file name to clipboardExpand all lines: examples/single-account-apprunner/variables.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@
11
11
variable"cloudtrail_sns_arn" {
12
12
type=string
13
13
default="create"
14
-
description="ARN of a pre-existing cloudtrail_sns. If defaulted, a new cloudtrail will be created"
14
+
description="ARN of a pre-existing cloudtrail_sns. If defaulted, a new cloudtrail will be created. ARN of a pre-existing cloudtrail_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS"
Copy file name to clipboardExpand all lines: examples/single-account-ecs/README.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ $ terraform apply
97
97
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)| List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
98
98
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events |`bool`|`true`| no |
99
99
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether cloudtrail delivered events to S3 should persist encrypted |`bool`|`true`| no |
100
-
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region|`string`|`"create"`| no |
100
+
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS|`string`|`"create"`| no |
101
101
| <aname="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark)| Whether to deploy or not the cloud benchmarking |`bool`|`true`| no |
102
102
| <aname="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr)| true/false whether to deploy the image scanning on ECR pushed images |`bool`|`true`| no |
103
103
| <aname="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs)| true/false whether to deploy the image scanning on ECS running images |`bool`|`true`| no |
Copy file name to clipboardExpand all lines: examples/single-account-ecs/variables.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@
11
11
variable"cloudtrail_sns_arn" {
12
12
type=string
13
13
default="create"
14
-
description="ARN of a pre-existing cloudtrail_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region"
14
+
description="ARN of a pre-existing cloudtrail_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS"
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
22
25
23
26
24
-
for AWS using customers
25
-
-[ ]do you have an existing cloudtrail?
27
+
###AWS
28
+
- do you have an existing cloudtrail?
26
29
- if yes, is it an organizational cloudtrail?
27
30
- does the cloudtrail report to an SNS?
28
31
- if it's not organizational, does each trail report to the same s3 bucket?
29
32
- sysdig secure for cloud is presented in different workload flavor; ECS, K8S or Apprunner, would you have any preference?
30
33
- in case of ECS or K8S, do you have an existing cluster you would like to re-use?
34
+
35
+
36
+
## Demo vs. Production
37
+
38
+
- Are you familiar with the installation stack? Terraform or Cloudformation.
39
+
- We recommend that whether you are demoing or not, to go for the most production similar environment.
40
+
41
+
## Terraform Example Selection
42
+
43
+
|| Single | Organizational |
44
+
| Deployment Type | All Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account, but some require to be deployed on member-accounts (for Compliance and Image Scanning)
45
+
| Benefits | Will only analyse current account | Handles all accounts (managed and member)
46
+
| Drawbacks | Cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | --
47
+
48
+
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted
0 commit comments