You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your
30
+
infrastructure. Check input summary on each example/module.
35
31
36
-
[comment]: <>(TODO review)
32
+
-**[`/use-cases`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/use-cases)** with self-baked customer-specific alternative scenarios.
33
+
<br/>
37
34
38
-
[comment]: <>(- `/org-role-ecs`)
35
+
Find specific overall service arquitecture diagrams attached to each example/use-case.
39
36
40
-
[comment]: <>(- `/org-role-eks`)
37
+
In the long-term our purpose is to evaluate those use-cases and if they're common enough, convert them into examples to make their usage easier.
41
38
39
+
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help.
42
40
43
41
### Notice
44
42
@@ -48,22 +46,9 @@ For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-g
48
46
-**Management Account ECR image scanning** is not support since it's [not a best practies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html#best-practices_mgmt-use) to have an ECR in the management account. However, we have a workaround to [solve this problem](#q-scanning-images-pushed-to-management-account-ecr-are-not-scanned) in case you need to scan images pushed to the management account ECR.
49
47
***Deployment cost** This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore
50
48
* For **free subscription** users, beware that organizational examples may not deploy properly due to the [1 cloud-account limitation](https://docs.sysdig.com/en/docs/administration/administration-settings/subscription/#cloud-billing-free-tier). Open an Issue so we can help you here!
51
-
<br/>
52
-
53
-
54
-
## Usage
55
49
56
-
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help and improve our module.
57
-
58
-
- There are several ways to deploy this in you AWS infrastructure, gathered under **[`/examples`](./examples)**
59
-
-[Single Account on ECS](./examples/single-account-ecs/README.md)
60
-
-[Single Account on AppRunner](./examples/single-account-apprunner/README.md)
61
-
-[Single-Account with a pre-existing Kubernetes Cluster](./examples/single-account-k8s/README.md)
- Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your
64
-
infrastructure. Check input summary on each example/module.
65
-
- Find some real self-baked **use-case scenarios** under [`/use-cases`](./use-cases)
66
50
51
+
<br/>
67
52
68
53
## Required Permissions
69
54
@@ -124,6 +109,8 @@ ecs:DescribeTaskDefinition
124
109
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
125
110
126
111
112
+
<br/>
113
+
127
114
## Confirm the Services are Working
128
115
129
116
Check official documentation on [Secure for cloud - AWS, Confirm the Services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
- Uninstall previous deployment resources before upgrading
307
-
```
308
-
$ terraform destroy
309
-
```
294
+
```
295
+
$ terraform destroy
296
+
```
310
297
311
298
- Upgrade the full terraform example with
312
-
313
-
```
314
-
$ terraform init -upgrade
315
-
$ terraform plan
316
-
$ terraform apply
317
-
```
299
+
```
300
+
$ terraform init -upgrade
301
+
$ terraform plan
302
+
$ terraform apply
303
+
```
318
304
319
305
- If required, you can upgrade cloud-connector component by restarting the task (stop task). Because it's not pinned to an specific version, it will download the latest one.
320
306
321
-
<br/><br/>
307
+
<br/>
308
+
322
309
## Authors
323
310
324
311
Module is maintained and supported by [Sysdig](https://sysdig.com).
0 commit comments