|
| 1 | +# Sysdig Secure for Cloud in AWS<br/> [ Example :: Trigger-Events] |
| 2 | + |
| 3 | +This example helps to trigger AWS Events. Cloud Connector stack is required to be able to generate events. |
| 4 | +After applying this module, a new AWS IAM Policy will be created. **Create IAM Policy that Allows All** event will prompt once the module is applied. |
| 5 | + |
| 6 | +## Prerequisites |
| 7 | + |
| 8 | +Minimum requirements: |
| 9 | + |
| 10 | +1. Deploy Cloud Connector Stack on AWS. |
| 11 | +2. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs) |
| 12 | + |
| 13 | +## Usage |
| 14 | + |
| 15 | +For quick testing, use this snippet on your terraform files |
| 16 | + |
| 17 | +```terraform |
| 18 | +provider "aws" { |
| 19 | + region = "<AWS-REGION>; ex. us-east-1" |
| 20 | +} |
| 21 | +
|
| 22 | +module "secure_for_cloud_aws_trigger-events"{ |
| 23 | + source = "sysdiglabs/secure-for-cloud/aws//examples/trigger-events" |
| 24 | +} |
| 25 | +``` |
| 26 | + |
| 27 | +To run this example you need have your [aws account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute: |
| 28 | +```terraform |
| 29 | +$ terraform init |
| 30 | +$ terraform plan |
| 31 | +$ terraform apply |
| 32 | +``` |
| 33 | + |
| 34 | +Notice that: |
| 35 | +* This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore |
| 36 | +* All created resources will be created within the tags `product:sysdig-secure-for-cloud`, within the resource-group `sysdig-secure-for-cloud` |
| 37 | + |
| 38 | +<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK --> |
| 39 | +## Requirements |
| 40 | + |
| 41 | +| Name | Version | |
| 42 | +|------|---------| |
| 43 | +| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.15.0 | |
| 44 | +| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.50.0 | |
| 45 | + |
| 46 | +## Providers |
| 47 | + |
| 48 | +| Name | Version | |
| 49 | +|------|---------| |
| 50 | +| <a name="provider_aws"></a> [aws](#provider\_aws) | 3.74.1 | |
| 51 | + |
| 52 | +## Modules |
| 53 | + |
| 54 | +No modules. |
| 55 | + |
| 56 | +## Resources |
| 57 | + |
| 58 | +| Name | Type | |
| 59 | +|------|------| |
| 60 | +| [aws_iam_policy.policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | |
| 61 | +| [aws_iam_policy_document.flow_log_cloudwatch_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | |
| 62 | + |
| 63 | +## Inputs |
| 64 | + |
| 65 | +No inputs. |
| 66 | + |
| 67 | +## Outputs |
| 68 | + |
| 69 | +No outputs. |
| 70 | +<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK --> |
| 71 | + |
| 72 | + |
| 73 | +## Authors |
| 74 | + |
| 75 | +Module is maintained and supported by [Sysdig](https://sysdig.com). |
| 76 | + |
| 77 | +## License |
| 78 | + |
| 79 | +Apache 2 Licensed. See LICENSE for full details. |
0 commit comments