From 9bb71269c597eb47a9d73a02a81791e8f05525d1 Mon Sep 17 00:00:00 2001 From: Girish Thimmegowda <60695752+onmyquest@users.noreply.github.com> Date: Thu, 23 Mar 2023 12:57:45 +0800 Subject: [PATCH 1/2] Add files via upload --- sysdig-agent-clusterrole.yaml | 72 +++++++++++++++++++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 sysdig-agent-clusterrole.yaml diff --git a/sysdig-agent-clusterrole.yaml b/sysdig-agent-clusterrole.yaml new file mode 100644 index 0000000..cd42be0 --- /dev/null +++ b/sysdig-agent-clusterrole.yaml @@ -0,0 +1,72 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: sysdig-agent +rules: +- apiGroups: + - "" + resources: + - pods + - replicationcontrollers + - services + - events + - limitranges + - namespaces + - nodes + #- nodes/metrics + - resourcequotas + - persistentvolumes + - persistentvolumeclaims + verbs: + - get + - list + - watch +- apiGroups: + - apps + resources: + - daemonsets + - deployments + - replicasets + - statefulsets + verbs: + - get + - list + - watch +- apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - get + - list + - watch +- apiGroups: + - batch + resources: + - cronjobs + - jobs + verbs: + - get + - list + - watch +- apiGroups: + - extensions + resources: + - daemonsets + - deployments + - ingresses + - replicasets + verbs: + - get + - list + - watch +metadata: + labels: + app: monitor + component: server + name: monitor +rules: +- nonResourceURLs: + - /metrics + verbs: + - get From ba9c92039a58b4ab3e13fec62b581c9283c6e28a Mon Sep 17 00:00:00 2001 From: Girish Thimmegowda <60695752+onmyquest@users.noreply.github.com> Date: Fri, 29 Sep 2023 09:08:45 +0800 Subject: [PATCH 2/2] Add files via upload --- main.tf | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 main.tf diff --git a/main.tf b/main.tf new file mode 100644 index 0000000..16e4651 --- /dev/null +++ b/main.tf @@ -0,0 +1,28 @@ +provider "aws" { + alias = "us-east-1" + region = "us-east-1" +} + +module "single-account-cspm" { + providers = { + aws = aws.us-east-1 + } + source = "draios/secure-for-cloud/aws//modules/services/trust-relationship" + role_name = "sysdig-secure-j2rx" + trusted_identity = "arn:aws:iam::761931097553:role/us-east-1-production-secure-assume-role" + external_id = "37db198a94d1b7770f36244f1fda20ca" +} + +module "single-account-threat-detection-us-east-1" { + providers = { + aws = aws.us-east-1 + } + source = "draios/secure-for-cloud/aws//modules/services/event-bridge" + target_event_bus_arn = "arn:aws:events:us-east-1:761931097553:event-bus/us-east-1-production-falco-1" + trusted_identity = "arn:aws:iam::761931097553:role/us-east-1-production-secure-assume-role" + external_id = "37db198a94d1b7770f36244f1fda20ca" + name = "sysdig-secure-cloudtrail-tgf2" + deploy_global_resources = true +} + +