From d48ea893d8186dd7f50a1a8cc6161443d0659b7b Mon Sep 17 00:00:00 2001 From: Noah Kraemer Date: Thu, 10 Oct 2024 09:10:00 -0700 Subject: [PATCH] fix pre-commit issues --- .terraform-registry | 3 --- README.md | 4 ++-- examples/single-account-k8s/README.md | 2 -- use-cases/manual-org-three-way.md | 2 +- 4 files changed, 3 insertions(+), 8 deletions(-) delete mode 100644 .terraform-registry diff --git a/.terraform-registry b/.terraform-registry deleted file mode 100644 index 6ee08926..00000000 --- a/.terraform-registry +++ /dev/null @@ -1,3 +0,0 @@ -Request: Please transfer ownership of the Terraform Registry module published from this repository from @wideawakening to @sysdig-terraform (Support request #118442) -Registry Link: https://registry.terraform.io/modules/sysdiglabs/secure-for-cloud/aws/latest -Request by: @nkraemer-sysdig diff --git a/README.md b/README.md index c7e75187..184a3d7d 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ > [!CAUTION] > Sysdig released a new onboarding experience for AWS in September 2024. We recommend connecting your cloud accounts by [following these instructions](https://docs.sysdig.com/en/docs/sysdig-secure/connect-cloud-accounts/). -> +> > This repository should be used solely in cases where Agentless Threat Detection cannot be used. ## Usage @@ -12,7 +12,7 @@ There are several ways to deploy Agent based Cloud Detection and Response (CDR) - [Single Account on AppRunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner/) - [Single-Account with a pre-existing Kubernetes Cluster](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s/) - [Organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational/) - + If you're unsure about how to use this module, please contact your Sysdig representative. Our experts will guide you through the process and assist you in setting up your account securely and correctly. ## Required Permissions diff --git a/examples/single-account-k8s/README.md b/examples/single-account-k8s/README.md index 101dff7f..b1c44307 100644 --- a/examples/single-account-k8s/README.md +++ b/examples/single-account-k8s/README.md @@ -94,7 +94,6 @@ $ terraform apply | Name | Source | Version | |------|--------|---------| -| [cloud\_bench](#module\_cloud\_bench) | ../../modules/services/cloud-bench | n/a | | [cloud\_connector\_sqs](#module\_cloud\_connector\_sqs) | ../../modules/infrastructure/sqs-sns-subscription | n/a | | [cloudtrail](#module\_cloudtrail) | ../../modules/infrastructure/cloudtrail | n/a | | [codebuild](#module\_codebuild) | ../../modules/infrastructure/codebuild | n/a | @@ -118,7 +117,6 @@ $ terraform apply | [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether s3 should be encrypted. testing/economization purpose. | `bool` | `true` | no | | [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region | `string` | `"create"` | no | | [deploy\_aws\_iam\_user](#input\_deploy\_aws\_iam\_user) | true/false whether to deploy an iam user. if set to false, check [required role permissions](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/resources/policy-single-account-k8s-aws.json) | `bool` | `true` | no | -| [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no | | [deploy\_beta\_image\_scanning\_ecr](#input\_deploy\_beta\_image\_scanning\_ecr) | true/false whether to deploy the beta image scanning on ECR pushed images (experimental and unsupported) | `bool` | `false` | no | | [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr) | true/false whether to deploy the image scanning on ECR pushed images | `bool` | `false` | no | | [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs) | true/false whether to deploy the image scanning on ECS running images | `bool` | `false` | no | diff --git a/use-cases/manual-org-three-way.md b/use-cases/manual-org-three-way.md index 17882c7d..5a783fe0 100644 --- a/use-cases/manual-org-three-way.md +++ b/use-cases/manual-org-three-way.md @@ -36,7 +36,7 @@ This setup will provide the following [Sysdig Secure for Cloud](https://docs.sys - EKS or ECS cluster to deploy Sysdig Secure for Cloud (Cloud Connector) See **account-management** and **account-security** modules in the diagram given below. - + ## Overview In this setup, you will do the following: