You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/single-account-ecs/README.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,6 +113,9 @@ $ terraform apply
113
113
| <aname="input_ecs_vpc_id"></a> [ecs\_vpc\_id](#input\_ecs\_vpc\_id)| ID of the VPC where the workload is to be deployed. If defaulted a new VPC will be created. If specified all three parameters `ecs_cluster_name`, `ecs_vpc_id` and `ecs_vpc_subnets_private_ids` are required |`string`|`"create"`| no |
114
114
| <aname="input_ecs_vpc_region_azs"></a> [ecs\_vpc\_region\_azs](#input\_ecs\_vpc\_region\_azs)| List of Availability Zones for ECS VPC creation. e.g.: ["apne1-az1", "apne1-az2"]. If defaulted, two of the default 'aws\_availability\_zones' datasource will be taken |`list(string)`|`[]`| no |
115
115
| <aname="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids)| List of VPC subnets where workload is to be deployed. If defaulted new subnets will be created within the VPC. A minimum of two subnets is suggested. If specified all three parameters `ecs_cluster_name`, `ecs_vpc_id` and `ecs_vpc_subnets_private_ids` are required. |`list(string)`|`[]`| no |
116
+
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| Whether to enable autoscaling or not |`bool`|`false`| no |
117
+
| <aname="input_max_replicas"></a> [max\_replicas](#input\_max\_replicas)| If autoscaling is enabled, this is the maximum number of replicas to run |`number`|`10`| no |
118
+
| <aname="input_min_replicas"></a> [min\_replicas](#input\_min\_replicas)| If autoscaling is enabled, this is the minimum number of replicas to run |`number`|`1`| no |
116
119
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc"`| no |
117
120
| <aname="input_tags"></a> [tags](#input\_tags)| customization of tags to be assigned to all resources. <br/>always include 'product' default tag for resource-group proper functioning.<br/>can also make use of the [provider-level `default-tags`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags)|`map(string)`| <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
@@ -76,10 +79,13 @@ A task deployed on an **ECS deployment** will detect events in your infrastructu
76
79
| <aname="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs)| true/false whether to deploy the image scanning on ECS running images |`bool`|`false`| no |
77
80
| <aname="input_ecs_task_cpu"></a> [ecs\_task\_cpu](#input\_ecs\_task\_cpu)| Amount of CPU (in CPU units) to reserve for cloud-connector task |`string`|`"256"`| no |
78
81
| <aname="input_ecs_task_memory"></a> [ecs\_task\_memory](#input\_ecs\_task\_memory)| Amount of memory (in megabytes) to reserve for cloud-connector task |`string`|`"512"`| no |
82
+
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| Enable autoscaling for the ECS service |`bool`|`false`| no |
79
83
| <a name="input_existing_cloudtrail_config"></a> [existing\_cloudtrail\_config](#input\_existing\_cloudtrail\_config) | Optional block. If not set, a new cloudtrail, sns and sqs resources will be created<br/><br>If there's an existing cloudtrail, input mandatory attributes, and one of the 1 or 2 labeled optionals.<br><ul><br> <li>cloudtrail\_sns\_arn: Optional 1. ARN of a cloudtrail-sns topic. If specified, deployment region must match Cloudtrail S3 bucket region</li><br> <li>cloudtrail\_s3\_sns\_sqs\_arn: Optional 2. ARN of the queue that will ingest events forwarded from an existing cloudtrail\_s3\_sns</li><br> <li>cloudtrail\_s3\_sns\_sqs\_url: Optional 2. URL of the queue that will ingest events forwarded from an existing cloudtrail\_s3\_sns<br/>sqs:ReceiveMessage and sqs:DeleteMessage permissions have to be provided to the compute role</li><br></ul> | <pre>object({<br> cloudtrail_sns_arn = optional(string)<br> cloudtrail_s3_sns_sqs_arn = optional(string)<br> cloudtrail_s3_sns_sqs_url = optional(string)<br> })</pre> | <pre>{<br> "cloudtrail_s3_sns_sqs_arn": null,<br> "cloudtrail_s3_sns_sqs_url": null,<br> "cloudtrail_sns_arn": "create"<br>}</pre> | no |
80
84
| <aname="input_extra_env_vars"></a> [extra\_env\_vars](#input\_extra\_env\_vars)| Extra environment variables for the Cloud Connector deployment |`map(string)`|`{}`| no |
81
85
| <aname="input_image"></a> [image](#input\_image)| Image of the cloud connector to deploy |`string`|`"quay.io/sysdig/cloud-connector:latest"`| no |
82
86
| <aname="input_is_organizational"></a> [is\_organizational](#input\_is\_organizational)| true/false whether `organizational_config` should be used to handle organizational setup |`bool`|`false`| no |
87
+
| <aname="input_max_replicas"></a> [max\_replicas](#input\_max\_replicas)| If autoscaling is enabled, this is the maximum number of replicas to run |`number`|`10`| no |
88
+
| <aname="input_min_replicas"></a> [min\_replicas](#input\_min\_replicas)| If autoscaling is enabled, this is the minimum number of replicas to run |`number`|`1`| no |
83
89
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc-cloudconnector"`| no |
84
90
| <aname="input_organizational_config"></a> [organizational\_config](#input\_organizational\_config)| organizational\_config. following attributes must be given<br><ul><br> <li>`sysdig_secure_for_cloud_role_arn` for cloud-connector assumeRole in order to read cloudtrail s3 events</li><br> <li>`connector_ecs_task_role_name` which has been granted trusted-relationship over the secure\_for\_cloud\_role</li><br> <li>`organizational_role_per_account` is the name of the organizational role deployed by AWS in each account of the organization. used for image-scanning only</li><br></ul> | <pre>object({<br> sysdig_secure_for_cloud_role_arn = string<br> organizational_role_per_account = string<br> connector_ecs_task_role_name = string<br> })</pre> | <pre>{<br> "connector_ecs_task_role_name": null,<br> "organizational_role_per_account": null,<br> "sysdig_secure_for_cloud_role_arn": null<br>}</pre> | no |
85
91
| <aname="input_tags"></a> [tags](#input\_tags)| customization of tags to be assigned to all resources. <br/>always include 'product' default tag for resource-group proper functioning.<br/>can also make use of the [provider-level `default-tags`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags)|`map(string)`| <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
0 commit comments