Skip to content

Latest commit

 

History

History

trigger-events

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

Sysdig Secure for Cloud in AWS
[ Example :: Trigger-Events]

This example helps to trigger AWS Events. Cloud Connector stack is required to be able to generate events. After applying this module, a new AWS IAM Policy will be created. Create IAM Policy that Allows All event will prompt once the module is applied.

Prerequisites

Minimum requirements:

  1. Deploy Cloud Connector Stack on AWS.
  2. Configure Terraform AWS Provider

Notice

  • Resource creation inventory Find all the resources created by Sysdig examples in the resource-group sysdig-secure-for-cloud (AWS Resource Group & Tag Editor)

  • Deployment cost This example will create resources that cost money.
    Run terraform destroy when you don't need them anymore

Usage

For quick testing, use this snippet on your terraform files

provider "aws" {
   region = "<AWS-REGION>; ex. us-east-1"
}

module "secure_for_cloud_aws_trigger-events"{
   source = "sysdiglabs/secure-for-cloud/aws//test/trigger-events"
}

To run this example you need have your aws account profile configured in CLI and to execute:

$ terraform init
$ terraform plan
$ terraform apply

Requirements

Name Version
terraform >= 1.0.0
aws >= 4.0.0

Providers

Name Version
aws >= 4.0.0

Modules

No modules.

Resources

Name Type
aws_iam_policy.policy resource
aws_iam_policy_document.flow_log_cloudwatch_assume_role data source

Inputs

No inputs.

Outputs

No outputs.

Authors

Module is maintained and supported by Sysdig.

License

Apache 2 Licensed. See LICENSE for full details.