Skip to content

Commit cbe0c22

Browse files
authored
docs: troubleshooting for management account ecr scanning
1 parent 7f87db4 commit cbe0c22

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed

README.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-g
4545
* [AWS regions](https://docs.aws.amazon.com/general/latest/gr/rande.html#regional-endpoints)
4646
* **Resource creation inventory** Find all the resources created by Sysdig examples in the resource-group `sysdig-secure-for-cloud` (AWS Resource Group & Tag Editor) <br/>
4747
* All Sysdig Secure for Cloud features but [Image Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/) are enabled by default. You can enable it through `deploy_scanning` input variable parameters.<br/>
48+
- **Management Account ECR image scanning** is not support since it's [not a best practies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html#best-practices_mgmt-use) to have an ECR in the management account. However, we have a workaround to [solve this problem](#q-scanning-images-pushed-to-management-account-ecr-are-not-scanned) in case you need to scan images pushed to the management account ECR.
4849
* **Deployment cost** This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore
4950
* For **free subscription** users, beware that organizational examples may not deploy properly due to the [1 cloud-account limitation](https://docs.sysdig.com/en/docs/administration/administration-settings/subscription/#cloud-billing-free-tier). Open an Issue so we can help you here!
5051
<br/>
@@ -255,6 +256,40 @@ A: Need to check several steps
255256
<br/>Dig into secure for cloud compute log (cloud-connector) and check for errors.
256257
<br/>If previous logs are ok, check [spawned scanning service](http://localhost:1313/en/docs/sysdig-secure/sysdig-secure-for-cloud/#summary) logs
257258

259+
### Q-Scanning: Images pushed to Management Account ECR are not scanned
260+
A: We don’t scan images from the management account ECR because is not a best practies to have an ECR in this account.
261+
</br>S: Following Role has to be created in the management account
262+
- Role Name: **OrganizationAccountAccessRole**
263+
- Permissions Policies:
264+
```json
265+
{
266+
"Version": "2012-10-17",
267+
"Statement": [
268+
{
269+
"Sid": "CustomPolicy",
270+
"Effect": "Allow",
271+
"Action": "ecr:GetAuthorizationToken",
272+
"Resource": "*"
273+
}
274+
]
275+
}
276+
```
277+
- Trust Relationships:
278+
```json
279+
{
280+
"Version": "2012-10-17",
281+
"Statement": [
282+
{
283+
"Effect": "Allow",
284+
"Principal": {
285+
"AWS": "arn:aws:iam::<<managementAccountID>>:root"
286+
},
287+
"Action": "sts:AssumeRole"
288+
}
289+
]
290+
}
291+
```
292+
258293
### Q-AWS: In the ECS compute flavor of secure for cloud, I don't see any logs in the cloud-connector component
259294
A: This may be due to the task not beinb able to start, normally due not not having enough permissions to even fetch the secure apiToken, stored in the AWS SSM service.
260295
<br/>S: Access the task and see if there is any value in the "Stopped Reason" field.

0 commit comments

Comments
 (0)