You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- fix autoscale since previous composition was not working as expected
- fix scaledown and bypass
hashicorp/terraform-provider-aws#10376
side-quest
- expose as inputs `autoscaling_confing`
│ * Account(***) Region(us - east - 1) Status(SUCCEEDED) Status Reason: No updates are to be performed.
336
-
│ * Account(***) Region(us - east - 1) Status(FAILED) Status Reason: Account *** should have
336
+
│ * Account(***) Region(us - east - 1) Status(FAILED) Status Reason: Account *** should have
337
337
'stacksets-exec-70e2f8a88d368a5d3df60f4eb8c247dc' role with trust relationship to Role 'aws-service-role/stacksets.cloudformation.amazonaws.com/AWSServiceRoleForCloudFormationStackSetsOrgAdmin
| <aname="input_sysdig_secure_for_cloud_member_account_id"></a> [sysdig\_secure\_for\_cloud\_member\_account\_id](#input\_sysdig\_secure\_for\_cloud\_member\_account\_id)| organizational member account where the secure-for-cloud workload is going to be deployed |`string`| n/a | yes |
189
+
| <aname="input_autoscaling_config"></a> [autoscaling\_config](#input\_autoscaling\_config)| if enable\_autoscaliing is enabled, ECS autoscaling configuration. for more insight check source code | <pre>object({<br> min_replicas = number<br> max_replicas = number<br> upscale_threshold = number<br> downscale_threshold = number<br> })</pre> | <pre>{<br> "downscale_threshold": 30,<br> "max_replicas": 15,<br> "min_replicas": 2,<br> "upscale_threshold": 60<br>}</pre> | no |
189
190
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)| List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
190
191
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether the created cloudtrail will ingest multi-regional events. testing/economization purpose. |`bool`|`true`| no |
191
192
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether the created cloudtrail should deliver encrypted events to s3 |`bool`|`true`| no |
@@ -204,8 +205,6 @@ $ terraform apply
204
205
| <aname="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids)| List of VPC subnets where workload is to be deployed. If defaulted new subnets will be created within the VPC. A minimum of two subnets is suggested. If specified all three parameters `ecs_cluster_name`, `ecs_vpc_id` and `ecs_vpc_subnets_private_ids` are required. |`list(string)`|`[]`| no |
205
206
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| Whether to enable autoscaling or not |`bool`|`false`| no |
206
207
| <a name="input_existing_cloudtrail_config"></a> [existing\_cloudtrail\_config](#input\_existing\_cloudtrail\_config) | Optional block. If not set, a new cloudtrail, sns and sqs resources will be created in the **management account**.<br>If provided through Option 1, resources (cloudtrail,cloudtrail-s3) must exist in the management account.<br>Option 2, is mandatory to be used when the cloudtrail-s3 is in a different account than where SFC worklaod is installed.<br>Option 3, is an alterntive to Option1, to be able to ingest events through cloudtrail-s3-sns subscribed SQS, instead of just cloudtrail-sns<br>Check [use-cases](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/use-cases) for proper permission setup.<br><ul><br> <li>cloudtrail\_s3\_arn: Optional 1. ARN of a pre-existing cloudtrail\_sns s3 bucket. Used together with `cloudtrail_sns_arn`, `cloudtrail_s3_arn`. If it does not exist, it will be inferred from create cloudtrail"</li><br> <li>cloudtrail\_sns\_arn: Optional 1. ARN of a pre-existing cloudtrail\_sns. Used together with `cloudtrail_sns_arn`, `cloudtrail_s3_arn`. If it does not exist, it will be inferred from created cloudtrail. Providing an ARN requires permission to SNS:Subscribe, check ./modules/infrastructure/cloudtrail/sns\_permissions.tf block</li><br> <li>cloudtrail\_s3\_role\_arn: Optional 2. ARN of the role to be assumed for S3 access. This role must be in the same account of the S3 bucket. Currently this setup is not compatible with organizational scanning feature</li><br> <li>cloudtrail\_s3\_sns\_sqs\_arn: Optional 3. ARN of the queue that will ingest events forwarded from an existing cloudtrail\_s3\_sns</li><br> <li>cloudtrail\_s3\_sns\_sqs\_url: Optional 3. URL of the queue that will ingest events forwarded from an existing cloudtrail\_s3\_sns<</li><br></ul> | <pre>object({<br> cloudtrail_s3_arn = optional(string)<br> cloudtrail_sns_arn = optional(string)<br> cloudtrail_s3_role_arn = optional(string)<br> cloudtrail_s3_sns_sqs_arn = optional(string)<br> cloudtrail_s3_sns_sqs_url = optional(string)<br> })</pre> | <pre>{<br> "cloudtrail_s3_arn": "create",<br> "cloudtrail_s3_role_arn": null,<br> "cloudtrail_s3_sns_sqs_arn": null,<br> "cloudtrail_s3_sns_sqs_url": null,<br> "cloudtrail_sns_arn": "create"<br>}</pre> | no |
207
-
| <aname="input_max_replicas"></a> [max\_replicas](#input\_max\_replicas)| If autoscaling is enabled, this is the maximum number of replicas to run |`number`|`30`| no |
208
-
| <aname="input_min_replicas"></a> [min\_replicas](#input\_min\_replicas)| If autoscaling is enabled, this is the minimum number of replicas to run |`number`|`1`| no |
209
208
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
210
209
| <aname="input_organizational_member_default_admin_role"></a> [organizational\_member\_default\_admin\_role](#input\_organizational\_member\_default\_admin\_role)| Default role created by AWS for management-account users to be able to admin member accounts.<br/>https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html|`string`|`"OrganizationAccountAccessRole"`| no |
211
210
| <aname="input_tags"></a> [tags](#input\_tags)| customization of tags to be assigned to all resources. <br/>always include 'product' default tag for resource-group proper functioning.<br/>can also make use of the [provider-level `default-tags`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags)|`map(string)`| <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
| <aname="input_autoscaling_config"></a> [autoscaling\_config](#input\_autoscaling\_config)| if enable\_autoscaliing is enabled, ECS autoscaling configuration. for more insight check source code | <pre>object({<br> min_replicas = number<br> max_replicas = number<br> upscale_threshold = number<br> downscale_threshold = number<br> })</pre> | <pre>{<br> "downscale_threshold": 30,<br> "max_replicas": 10,<br> "min_replicas": 1,<br> "upscale_threshold": 60<br>}</pre> | no |
100
101
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)| List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
101
102
| <aname="input_cloud_connector_image"></a> [cloud\_connector\_image](#input\_cloud\_connector\_image)| Image to use for the cloud connector. If empty, the default image will be used. |`string`|`"quay.io/sysdig/cloud-connector:latest"`| no |
102
103
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events |`bool`|`true`| no |
@@ -114,8 +115,6 @@ $ terraform apply
114
115
| <aname="input_ecs_vpc_region_azs"></a> [ecs\_vpc\_region\_azs](#input\_ecs\_vpc\_region\_azs)| List of Availability Zones for ECS VPC creation. e.g.: ["apne1-az1", "apne1-az2"]. If defaulted, two of the default 'aws\_availability\_zones' datasource will be taken |`list(string)`|`[]`| no |
115
116
| <aname="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids)| List of VPC subnets where workload is to be deployed. If defaulted new subnets will be created within the VPC. A minimum of two subnets is suggested. If specified all three parameters `ecs_cluster_name`, `ecs_vpc_id` and `ecs_vpc_subnets_private_ids` are required. |`list(string)`|`[]`| no |
116
117
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| Whether to enable autoscaling or not |`bool`|`false`| no |
117
-
| <aname="input_max_replicas"></a> [max\_replicas](#input\_max\_replicas)| If autoscaling is enabled, this is the maximum number of replicas to run |`number`|`10`| no |
118
-
| <aname="input_min_replicas"></a> [min\_replicas](#input\_min\_replicas)| If autoscaling is enabled, this is the minimum number of replicas to run |`number`|`1`| no |
119
118
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
120
119
| <aname="input_tags"></a> [tags](#input\_tags)| customization of tags to be assigned to all resources. <br/>always include 'product' default tag for resource-group proper functioning.<br/>can also make use of the [provider-level `default-tags`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags)|`map(string)`| <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
0 commit comments