You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
***Resource creation inventory** Find all the resources created by Sysdig examples in the resource-group `sysdig-secure-for-cloud` (AWS Resource Group & Tag Editor) <br/>
47
47
* All Sysdig Secure for Cloud features but [Image Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/) are enabled by default. You can enable it through `deploy_scanning` input variable parameters.<br/>
48
+
-**Management Account ECR image scanning** is not support since it's [not a best practies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html#best-practices_mgmt-use) to have an ECR in the management account. However, we have a workaround to [solve this problem](#q-scanning-images-pushed-to-management-account-ecr-are-not-scanned) in case you need to scan images pushed to the management account ECR.
48
49
***Deployment cost** This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore
49
50
* For **free subscription** users, beware that organizational examples may not deploy properly due to the [1 cloud-account limitation](https://docs.sysdig.com/en/docs/administration/administration-settings/subscription/#cloud-billing-free-tier). Open an Issue so we can help you here!
50
51
<br/>
@@ -255,6 +256,40 @@ A: Need to check several steps
255
256
<br/>Dig into secure for cloud compute log (cloud-connector) and check for errors.
256
257
<br/>If previous logs are ok, check [spawned scanning service](http://localhost:1313/en/docs/sysdig-secure/sysdig-secure-for-cloud/#summary) logs
257
258
259
+
### Q-Scanning: Images pushed to Management Account ECR are not scanned
260
+
A: We don’t scan images from the management account ECR because is not a best practies to have an ECR in this account.
261
+
</br>S: Following Role has to be created in the management account
### Q-AWS: In the ECS compute flavor of secure for cloud, I don't see any logs in the cloud-connector component
259
294
A: This may be due to the task not beinb able to start, normally due not not having enough permissions to even fetch the secure apiToken, stored in the AWS SSM service.
260
295
<br/>S: Access the task and see if there is any value in the "Stopped Reason" field.
0 commit comments