You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+33-24Lines changed: 33 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,35 @@ Provides unified threat-detection, compliance, forensics and analysis through th
14
14
15
15
For other Cloud providers check: [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
16
16
17
+
<br/>
18
+
19
+
## Usage
20
+
21
+
There are several ways to deploy Secure for Cloud in you GCP infrastructure,
22
+
23
+
-**[`/examples`](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/examples)** for the most common scenarios
-[Single Project with a pre-existing Kubernetes Cluster](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/examples/single-project-k8s/README.md)
- Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your
28
+
infrastructure. Check input summary on each example/module.
29
+
-**[`/use-cases`](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/use-cases)** with self-baked customer-specific alternative scenarios.
30
+
31
+
Find specific overall service arquitecture diagrams attached to each example/use-case.
32
+
33
+
In the long-term our purpose is to evaluate those use-cases and if they're common enough, convert them into examples to make their usage easier.
34
+
35
+
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help.
* Do not confuse required `region` with GCP location or zone. [Identifying a region or zone](https://cloud.google.com/compute/docs/regions-zones/#identifying_a_region_or_zone)
21
41
* All Sysdig Secure for Cloud features but [Image Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/) are enabled by default. You can enable it through `deploy_scanning` input variable parameter of each example.<br/>
22
42
* This example will create resources that **cost money**. Run `terraform destroy` when you don't need them anymore.
23
43
* For **free subscription** users, beware that organizational examples may not deploy properly due to the [1 cloud-account limitation](https://docs.sysdig.com/en/docs/administration/administration-settings/subscription/#cloud-billing-free-tier). Open an Issue so we can help you here!
44
+
45
+
24
46
<br/>
25
47
26
48
## Prerequisites
@@ -67,19 +89,7 @@ Besides, the following GCP **APIs must be enabled** ([how do I check it?](#q-how
If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help and improve our module.
73
-
74
-
- There are several ways to deploy this in you AWS infrastructure, gathered under **[`/examples`](./examples)**
- Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your
79
-
infrastructure. Check input summary on each example/module.
80
-
- Find some real self-baked **use-case scenarios** under [`/use-cases`](./use-cases)
81
-
82
-
92
+
<br/>
83
93
84
94
## Confirm the Services are Working
85
95
@@ -115,7 +125,7 @@ It may take some time, but you should see logs detecting the new image in the `c
115
125
116
126
And a CloudBuild being launched successfully.
117
127
118
-
128
+
<br/>
119
129
120
130
## Troubleshooting
121
131
@@ -226,21 +236,20 @@ A: Verify that `gcr` topic exists. If `create_gcr_topic` is set to false and `gc
226
236
## Upgrading
227
237
228
238
- Uninstall previous deployment resources before upgrading
229
-
```
230
-
$ terraform destroy
231
-
```
239
+
```
240
+
$ terraform destroy
241
+
```
232
242
233
243
- Upgrade the full terraform example with
234
-
235
-
```
236
-
$ terraform init -upgrade
237
-
$ terraform plan
238
-
$ terraform apply
239
-
```
244
+
```
245
+
$ terraform init -upgrade
246
+
$ terraform plan
247
+
$ terraform apply
248
+
```
240
249
241
250
- If required, you can upgrade cloud-connector component by restarting the task (stop task). Because it's not pinned to an specific version, it will download the latest one.
0 commit comments