Skip to content

Commit ae0e265

Browse files
author
iru
committed
chore(doc): diagram review
[skip ci]
1 parent 7d14282 commit ae0e265

File tree

4 files changed

+5
-4
lines changed

4 files changed

+5
-4
lines changed

.github/workflows/ci-pull-request.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ jobs:
111111
run: pre-commit run --color=always --show-diff-on-failure --all-files
112112

113113
integration_test:
114+
if: contains(github.event.head_commit.message, '[skip ci]') == false
114115
name: Test-Kitchen
115116
runs-on: ubuntu-latest
116117
env:

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,14 @@ There are several ways to deploy this in you AWS infrastructure:
2323
Sysdig workload will be deployed in the same account where user's resources will be watched.<br/>
2424
More info in [`./examples/single-account`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account)
2525

26-
![single-account diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/b95bf11fe513bda3c037144803d982a6e4225ce9/examples/single-account/diagram-single.png)
26+
![single-account diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/7d142829a701ce78f13691a4af4be373625e7ee2/examples/single-account/diagram-single.png)
2727

2828
### Organizational
2929

3030
Using an organizational configuration Cloudtrail.
3131
More info in [`./examples/organizational`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational)
3232

33-
![organizational diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/b95bf11fe513bda3c037144803d982a6e4225ce9/examples/organizational/diagram-org.png)
33+
![organizational diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/7d142829a701ce78f13691a4af4be373625e7ee2/examples/organizational/diagram-org.png)
3434

3535
### Self-Baked
3636

examples/organizational/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Deploy Sysdig Secure for Cloud sharing the Trail within an organization.
1010
* In the **user-provided member account**
1111
* All the Sysdig Secure for Cloud service-related resources will be created
1212

13-
![organizational diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/b95bf11fe513bda3c037144803d982a6e4225ce9/examples/organizational/diagram-org.png)
13+
![organizational diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/7d142829a701ce78f13691a4af4be373625e7ee2/examples/organizational/diagram-org.png)
1414

1515
## Prerequisites
1616

examples/single-account/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Deploy Sysdig Secure for Cloud in a single AWS account.
66

77
All the required resources and workloads will be run under the same AWS account.
88

9-
![single-account diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/b95bf11fe513bda3c037144803d982a6e4225ce9/examples/single-account/diagram-single.png)
9+
![single-account diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/7d142829a701ce78f13691a4af4be373625e7ee2/examples/single-account/diagram-single.png)
1010

1111
## Prerequisites
1212

0 commit comments

Comments
 (0)