Skip to content

Commit fdaf658

Browse files
author
iru
authored
Update org-three-way-ecs.md
1 parent 7827f0c commit fdaf658

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

use-cases/org-three-way-ecs.md

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -139,21 +139,10 @@ We provide a module to create this
139139
[Cloudtrail S3 bucket event-forwarder into an SNS>SQS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/infrastructure/cloudtrail_s3-sns-sqs)
140140
but you can do it manually too.
141141

142-
General usage is described within the module source, and will be explained in the next point, with the variables to
143-
be used.
144-
145-
#### 4. Launch Terraform Manifest
146-
147-
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
148-
<br/>Get detailed explanation of each variable bellow.
142+
This module must not run on the same terraform (plan) sequence, because it will have cycle dependecies not resolved and will fail.
149143

150144
```terraform
151145
152-
153-
# ----------------------------------------------------------
154-
# Optional. for Cloudtrail S3-SNS-SQS event-forwarder creation
155-
# ----------------------------------------------------------
156-
157146
# provider for S3 account
158147
# this is a sample authentication, can adapt it as long as alias is maintained
159148
provider "aws"{
@@ -171,8 +160,17 @@ module "cloudtrail_s3_sns_sqs" {
171160
source = "sysdiglabs/secure-for-cloud/aws//modules/infrastructure/cloudtrail_s3-sns-sqs"
172161
cloudtrail_s3_name = "<CLOUDTRAIL_S3_NAME>"
173162
}
174-
# --------------------------------------------------
163+
```
175164

165+
Inspect `terraform state list` to gather these two values, `CLOUDTRAIL_S3_SNS_SQS_ARN` and `CLOUDTRAIL_S3_SNS_SQS_URL`.
166+
167+
168+
#### 4. Launch Terraform Manifest
169+
170+
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
171+
<br/>Get detailed explanation of each variable bellow.
172+
173+
```terraform
176174
177175
terraform {
178176
required_providers {
@@ -239,8 +237,8 @@ module "sysdig-sfc" {
239237
- **Cloudtrail S3 SNS-SQS** Setup
240238
- `S3_BUCKET_ACCOUNT_ID` in order to authenticate aws provider on the member account
241239
- `CLOUDTRAIL_S3_NAME` name of the cloudtrail s3 bucket
242-
- `CLOUDTRAIL_S3_SNS_SQS_ARN` if manged through terraform should have value `module.cloudtrail_s3_sns_sqs.cloudtrail_subscribed_sqs_arn`
243-
- `CLOUDTRAIL_S3_SNS_SQS_URL` if manged through terraform should have value `module.cloudtrail_s3_sns_sqs.cloudtrail_subscribed_sqs_url"`
240+
- `CLOUDTRAIL_S3_SNS_SQS_ARN` value gathered from 3.3 action point.
241+
- `CLOUDTRAIL_S3_SNS_SQS_URL` value gathered from 3.3 action point.
244242
- (Optional) `CLOUDTRAIL_S3_ROLE_ARN` ARN of the `SysdigSecureForCloud-S3AccessRole` created in step 3.2, for ECSTaskRole to assumeRole and access S3
245243

246244
- (Optional) Existing **ECS Cluster and networking** setup
@@ -314,4 +312,4 @@ We should not need to restart ECSTask as this changes will be applied on runtime
314312
### 6. Check-up
315313

316314
- Access ECS logs for the SecureForCloud task and check that there are no errors and events are being ingested
317-
- If logs are ok, [Sysdig Secure Docs - Secure for cloud - AWS - Confirm services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
315+
- If logs are ok, [Sysdig Secure Docs - Secure for cloud - AWS - Confirm services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)

0 commit comments

Comments
 (0)