You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
removing ACL block since by default it's private
Adding aws_s3_bucket_ownership_controls to block ACL modifications
Keeping this change
https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/pull/164/files
since AWS has not yet released the feature so public block access is not
enabled by default.
<!--
Thank you for your contribution!
## Testing your PR
You can pinpoint the pr changes as terraform module source with
following format
```
source = "github.com/sysdiglabs/terraform-aws-secure-for-cloud//examples/organizational?ref=<BRANCH_NAME>"
```
## General recommendations
Check contribution guidelines at
https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/CONTRIBUTE.md#contribution-checklist
For a cleaner PR make sure you follow these recommendations:
- Review modified files and delete small changes that were not intended
and maybe slip the commit.
- Use Pull Request Drafts for visibility on Work-In-Progress branches
and use them on daily mob/pairing for team review
- Unless an external revision is desired, in order to validate or gather
some feedback, you are free to merge as long as **validation checks are
green-lighted**
## Checklist
- [ ] If `test/fixtures/*/main.tf` files are modified, update:
- [ ] the snippets in the README.md file under root folder.
- [ ] the snippets in the README.md file for the corresponding example.
- [ ] If `examples` folder are modified, update:
- [ ] README.md file with pertinent changes.
- [ ] `test/fixtures/*/main.tf` in case the snippet needs modifications.
- [ ] If any architectural change has been made, update the diagrams.
-->
description="Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances"
Copy file name to clipboardExpand all lines: use-cases/org-three-way-ecs.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ This accountID will be required in the `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_I
106
106
107
107
#### 3.2 (Optional) S3 and Sysdig Workload are in different accounts
108
108
109
-
If `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` is different to the account where the S3 is located, we need to allow
109
+
If `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` is different to the account where the S3 is located, we need to allow
110
110
cross-account access through a role.
111
111
112
112
Permission setup for SysdigSecureForCloud-S3AccessRole
@@ -129,13 +129,13 @@ Permission setup for SysdigSecureForCloud-S3AccessRole
129
129
130
130
#### 3.3 Cloudtrail S3 ingestion through Event-Forward
131
131
132
-
When Cloudtrail-SNS is not available, or the Cloudtrail-S3 events are in an account different to the management
132
+
When Cloudtrail-SNS is not available, or the Cloudtrail-S3 events are in an account different to the management
133
133
account, we will rely on a S3 Event Forwarder, to allow the workload to ingest events more easily.
134
134
135
-
Secure for Cloud requires an SQS queue from which it can ingest events, and this will provide
135
+
Secure for Cloud requires an SQS queue from which it can ingest events, and this will provide
136
136
`CLOUDTRAIL_S3_SNS_SQS_ARN` and `CLOUDTRAIL_S3_SNS_SQS_URL` for later installation.
137
137
138
-
We provide a module to create this
138
+
We provide a module to create this
139
139
[Cloudtrail S3 bucket event-forwarder into an SNS>SQS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/infrastructure/cloudtrail_s3-sns-sqs)
140
140
but you can do it manually too.
141
141
@@ -167,7 +167,7 @@ Inspect `terraform state list` to gather these two values, `CLOUDTRAIL_S3_SNS_SQ
167
167
168
168
#### 4. Launch Terraform Manifest
169
169
170
-
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
170
+
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
171
171
<br/>Get detailed explanation of each variable bellow.
0 commit comments