This example helps to trigger AWS Events. Cloud Connector stack is required to be able to generate events. After applying this module, a new AWS IAM Policy will be created. Create IAM Policy that Allows All event will prompt once the module is applied.
Minimum requirements:
- Deploy Cloud Connector Stack on AWS.
- Configure Terraform AWS Provider
- Resource creation inventory Find all the resources created by Sysdig examples in the resource-group
sysdig-secure-for-cloud
(AWS Resource Group & Tag Editor) - Deployment cost This example will create resources that cost money.
Runterraform destroy
when you don't need them anymore
For quick testing, use this snippet on your terraform files
provider "aws" {
region = "<AWS-REGION>; ex. us-east-1"
}
module "secure_for_cloud_aws_trigger-events"{
source = "sysdiglabs/secure-for-cloud/aws//test/trigger-events"
}
To run this example you need have your aws account profile configured in CLI and to execute:
$ terraform init
$ terraform plan
$ terraform apply
Name | Version |
---|---|
terraform | >= 1.0.0 |
aws | >= 4.0.0 |
Name | Version |
---|---|
aws | >= 4.0.0 |
No modules.
Name | Type |
---|---|
aws_iam_policy.policy | resource |
aws_iam_policy_document.flow_log_cloudwatch_assume_role | data source |
No inputs.
No outputs.
Module is maintained and supported by Sysdig.
Apache 2 Licensed. See LICENSE for full details.