Skip to content

Commit f87bc7e

Browse files
committed
fix: precommit
1 parent e0a59a4 commit f87bc7e

File tree

5 files changed

+13
-11
lines changed

5 files changed

+13
-11
lines changed

examples/organizational/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,7 @@ $ terraform apply
183183
| <a name="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions) | List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. | `list(string)` | `[]` | no |
184184
| <a name="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail) | true/false whether the created cloudtrail will ingest multi-regional events. testing/economization purpose. | `bool` | `true` | no |
185185
| <a name="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether the created cloudtrail should deliver encrypted events to s3 | `bool` | `true` | no |
186+
| <a name="input_cloudtrail_s3_bucket_expiration_days"></a> [cloudtrail\_s3\_bucket\_expiration\_days](#input\_cloudtrail\_s3\_bucket\_expiration\_days) | Number of days that the logs will persist in the bucket | `number` | `5` | no |
186187
| <a name="input_connector_ecs_task_role_name"></a> [connector\_ecs\_task\_role\_name](#input\_connector\_ecs\_task\_role\_name) | Name for the ecs task role. This is only required to resolve cyclic dependency with organizational approach | `string` | `"organizational-ECSTaskRole"` | no |
187188
| <a name="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no |
188189
| <a name="input_deploy_benchmark_organizational"></a> [deploy\_benchmark\_organizational](#input\_deploy\_benchmark\_organizational) | true/false whether benchmark module should be deployed on organizational or single-account mode (1 role per org accounts if true, 1 role in default aws provider account if false)</li></ul> | `bool` | `true` | no |

examples/organizational/cloudtrail.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ module "cloudtrail" {
1616
sysdig_secure_for_cloud_member_account_id = var.sysdig_secure_for_cloud_member_account_id
1717
organizational_role_per_account = var.organizational_member_default_admin_role
1818
}
19-
is_multi_region_trail = var.cloudtrail_is_multi_region_trail
20-
cloudtrail_kms_enable = var.cloudtrail_kms_enable
19+
is_multi_region_trail = var.cloudtrail_is_multi_region_trail
20+
cloudtrail_kms_enable = var.cloudtrail_kms_enable
2121
s3_bucket_expiration_days = var.cloudtrail_s3_bucket_expiration_days
2222

2323
tags = var.tags

examples/single-account-ecs/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ $ terraform apply
9999
| <a name="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions) | List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. | `list(string)` | `[]` | no |
100100
| <a name="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail) | true/false whether cloudtrail will ingest multiregional events | `bool` | `true` | no |
101101
| <a name="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable) | true/false whether cloudtrail delivered events to S3 should persist encrypted | `bool` | `true` | no |
102+
| <a name="input_cloudtrail_s3_bucket_expiration_days"></a> [cloudtrail\_s3\_bucket\_expiration\_days](#input\_cloudtrail\_s3\_bucket\_expiration\_days) | Number of days that the logs will persist in the bucket | `number` | `5` | no |
102103
| <a name="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn) | ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, sysdig deployment account and region must match with the specified SNS | `string` | `"create"` | no |
103104
| <a name="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark) | Whether to deploy or not the cloud benchmarking | `bool` | `true` | no |
104105
| <a name="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr) | true/false whether to deploy the image scanning on ECR pushed images | `bool` | `false` | no |

examples/single-account-ecs/cloudtrail.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ locals {
44
}
55

66
module "cloudtrail" {
7-
count = local.cloudtrail_deploy ? 1 : 0
8-
source = "../../modules/infrastructure/cloudtrail"
9-
name = var.name
10-
is_organizational = false
11-
is_multi_region_trail = var.cloudtrail_is_multi_region_trail
12-
cloudtrail_kms_enable = var.cloudtrail_kms_enable
7+
count = local.cloudtrail_deploy ? 1 : 0
8+
source = "../../modules/infrastructure/cloudtrail"
9+
name = var.name
10+
is_organizational = false
11+
is_multi_region_trail = var.cloudtrail_is_multi_region_trail
12+
cloudtrail_kms_enable = var.cloudtrail_kms_enable
1313
s3_bucket_expiration_days = var.cloudtrail_s3_bucket_expiration_days
1414

1515
tags = var.tags

test/fixtures/organizational/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
terraform {
22
required_providers {
3-
aws = {
3+
aws = {
44
version = ">= 4.0.0"
55
configuration_aliases = [aws.member]
66
}
@@ -34,8 +34,8 @@ module "cloudvision_aws_organizational" {
3434
providers = {
3535
aws.member = aws.member
3636
}
37-
source = "../../../examples/organizational"
38-
name = var.name
37+
source = "../../../examples/organizational"
38+
name = var.name
3939

4040
sysdig_secure_for_cloud_member_account_id = var.sysdig_secure_for_cloud_member_account_id
4141
deploy_image_scanning_ecr = true

0 commit comments

Comments
 (0)