You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SSPROD-56225 - allow pre-existing SP and AD resources (#73)
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
* SSPROD-56225 - allow pre-existing SP and AD resources
Copy file name to clipboardExpand all lines: README.md
+4Lines changed: 4 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,8 @@ for the respective Sysdig features. They manage both, onboarding a single Azure
26
26
27
27
`onboarding`, `config-posture` and `agentless-scanning` are independent feature modules.
28
28
29
+
A Service Principal is created per each independent module due to permission scoping, if you want to use a pre-existing one instead of creating a new one, refer to each module's README file.
30
+
29
31
### Integrations
30
32
31
33
The modules under `integrations` are feature agnostic modules which deploy and manage all the required Cloud resources and Sysdig resources
@@ -35,6 +37,8 @@ These modules manage both, onboarding a single Azure Subscription or an Azure Te
35
37
36
38
`event-hub` is an integration module.
37
39
40
+
A Service Principal is created per each independent integration module due to permission scoping, if you want to use a pre-existing one instead of creating a new one, refer to each module's README file.
41
+
38
42
## Examples and usage
39
43
40
44
The modules in this repository can be installed on a single Azure subscription, or on an entire Azure Tenant, or management groups within the Tenant.
Copy file name to clipboardExpand all lines: modules/config-posture/README.md
+20-7Lines changed: 20 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,18 @@ If instrumenting an Azure Tenant, the following resources will be created:
12
12
- Role assignments with associated role permissions at the Root Management Group level by default for the Tenant, or at each of the
13
13
instrumented Management Groups within the Tenant if provided.
14
14
15
+
**Important**. If using a pre-existing Service Principal is needed, creating a service principal associated with the Sysdig Config Posture Application ID is required:
16
+
- The Sysdig Config Posture Application ID can be found as part of the output of the `sysdig_secure_trusted_azure_app` data source created in this module. Also, it can be retrieved by hitting the Sysdig onboarding API using the `sysdig_secure_api_token` provided within the Sysdig UI > Settings > Sysdig Secure API Token, the API curl command uses the `app=config_posture` query parameter:
- From the previous call, use the `applicationId` field from the response to create the Service Principal in your Azure Tenant.
22
+
- Assign the [Directory Reader role](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#directory-readers) to the Service Principal created in your Azure Tenant. This is a required permission, the role template ID for this role is `88d8e3e3-8f55-4a1e-953a-9b9898b8876b`.
23
+
- Provide the Service Principal ID as input to the `config_posture_service_principal` variable in this module. This will
24
+
skip the creation of a new Service Principal and use the one provided instead.
25
+
- Contact Sysdig Support if you need assistance with this process.
26
+
15
27
This module will also deploy a Service Principal Component in Sysdig Backend for onboarded Sysdig Cloud Account.
16
28
17
29
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
@@ -55,13 +67,14 @@ No modules.
55
67
56
68
## Inputs
57
69
58
-
| Name | Description | Type | Default | Required |
| <aname="input_agentless_aks_connection_enabled"></a> [agentless\_aks\_connection\_enabled](#input\_agentless\_aks\_connection\_enabled)| Enable the Agentless AKS connection to the K8s clusters within the cloud. This allows admin access. Read more about why this is needed in the official docs. |`bool`|`false`| no |
61
-
| <aname="input_is_organizational"></a> [is\_organizational](#input\_is\_organizational)| (Optional) Set this field to 'true' to deploy secure-for-cloud to an Azure Tenant. |`bool`|`false`| no |
62
-
| <aname="input_management_group_ids"></a> [management\_group\_ids](#input\_management\_group\_ids)| (Optional) List of Azure Management Group IDs. secure-for-cloud will be deployed to all the subscriptions under these management groups. |`set(string)`|`[]`| no |
63
-
| <aname="input_subscription_id"></a> [subscription\_id](#input\_subscription\_id)| Subscription ID in which to create resources for secure-for-cloud |`string`| n/a | yes |
64
-
| <aname="input_sysdig_secure_account_id"></a> [sysdig\_secure\_account\_id](#input\_sysdig\_secure\_account\_id)| ID of the Sysdig Cloud Account to enable Config Posture for (incase of organization, ID of the Sysdig management account) |`string`| n/a | yes |
70
+
| Name | Description | Type | Default | Required |
|<a name="input_agentless_aks_connection_enabled"></a> [agentless\_aks\_connection\_enabled](#input\_agentless\_aks\_connection\_enabled) | Enable the Agentless AKS connection to the K8s clusters within the cloud. This allows admin access. Read more about why this is needed in the official docs. | `bool` | `false` | no |
73
+
|<a name="input_is_organizational"></a> [is\_organizational](#input\_is\_organizational) | (Optional) Set this field to 'true' to deploy secure-for-cloud to an Azure Tenant. | `bool` | `false` | no |
74
+
|<a name="input_management_group_ids"></a> [management\_group\_ids](#input\_management\_group\_ids) | (Optional) List of Azure Management Group IDs. secure-for-cloud will be deployed to all the subscriptions under these management groups. | `set(string)` | `[]` | no |
75
+
|<a name="input_subscription_id"></a> [subscription\_id](#input\_subscription\_id) | Subscription ID in which to create resources for secure-for-cloud | `string` | n/a | yes |
76
+
|<a name="input_sysdig_secure_account_id"></a> [sysdig\_secure\_account\_id](#input\_sysdig\_secure\_account\_id) | ID of the Sysdig Cloud Account to enable Config Posture for (incase of organization, ID of the Sysdig management account) | `string` | n/a | yes |
77
+
|<a name="input_config_posture_service_principal"></a> [config\_posture\_service\_principal](#input\_config\_posture\_service\_principal) | (Optional) Service Principal to be used for CSPM, this SP needs to be associated to the Sysdig Config Posture Application ID. If not provided, a new one will be created. | `string` | `""` | no |
description="Enable the Agentless AKS connection to the K8s clusters within the cloud. This allows admin access. Read more about why this is needed in the official docs."
26
26
default=false
27
27
}
28
+
29
+
variable"config_posture_service_principal" {
30
+
description="(Optional) Service Principal to be used for CSPM. If not provided, a new one will be created."
0 commit comments