You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/org-three-way-ecs.md
+14-16Lines changed: 14 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -139,21 +139,10 @@ We provide a module to create this
139
139
[Cloudtrail S3 bucket event-forwarder into an SNS>SQS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/infrastructure/cloudtrail_s3-sns-sqs)
140
140
but you can do it manually too.
141
141
142
-
General usage is described within the module source, and will be explained in the next point, with the variables to
143
-
be used.
144
-
145
-
#### 4. Launch Terraform Manifest
146
-
147
-
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
148
-
<br/>Get detailed explanation of each variable bellow.
142
+
This module must not run on the same terraform (plan) sequence, because it will have cycle dependecies not resolved and will fail.
Inspect `terraform state list` to gather these two values, `CLOUDTRAIL_S3_SNS_SQS_ARN` and `CLOUDTRAIL_S3_SNS_SQS_URL`.
166
+
167
+
168
+
#### 4. Launch Terraform Manifest
169
+
170
+
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
171
+
<br/>Get detailed explanation of each variable bellow.
172
+
173
+
```terraform
176
174
177
175
terraform {
178
176
required_providers {
@@ -239,8 +237,8 @@ module "sysdig-sfc" {
239
237
-**Cloudtrail S3 SNS-SQS** Setup
240
238
-`S3_BUCKET_ACCOUNT_ID` in order to authenticate aws provider on the member account
241
239
-`CLOUDTRAIL_S3_NAME` name of the cloudtrail s3 bucket
242
-
-`CLOUDTRAIL_S3_SNS_SQS_ARN`if manged through terraform should have value `module.cloudtrail_s3_sns_sqs.cloudtrail_subscribed_sqs_arn`
243
-
-`CLOUDTRAIL_S3_SNS_SQS_URL`if manged through terraform should have value `module.cloudtrail_s3_sns_sqs.cloudtrail_subscribed_sqs_url"`
240
+
-`CLOUDTRAIL_S3_SNS_SQS_ARN`value gathered from 3.3 action point.
241
+
-`CLOUDTRAIL_S3_SNS_SQS_URL`value gathered from 3.3 action point.
244
242
- (Optional) `CLOUDTRAIL_S3_ROLE_ARN` ARN of the `SysdigSecureForCloud-S3AccessRole` created in step 3.2, for ECSTaskRole to assumeRole and access S3
245
243
246
244
- (Optional) Existing **ECS Cluster and networking** setup
@@ -314,4 +312,4 @@ We should not need to restart ECSTask as this changes will be applied on runtime
314
312
### 6. Check-up
315
313
316
314
- Access ECS logs for the SecureForCloud task and check that there are no errors and events are being ingested
317
-
- If logs are ok, [Sysdig Secure Docs - Secure for cloud - AWS - Confirm services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
315
+
- If logs are ok, [Sysdig Secure Docs - Secure for cloud - AWS - Confirm services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
0 commit comments