diff --git a/README.md b/README.md index f47ad1e..3cd91f5 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,6 @@ # Sysdig Secure for Cloud in Azure -Terraform module that deploys the [**Sysdig Secure for Cloud** stack in **Azure**](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-azure) -. +Terraform module that deploys the [**Sysdig Secure for Cloud** stack in **Azure**](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-azure).
Provides unified threat-detection, compliance, forensics and analysis through these major components: @@ -47,81 +46,17 @@ consolidate. ## Usage -### - Single-Subscription - -Sysdig workload will be deployed in the same account where user's resources will be watched.
-More info -in [`./examples/single-subscription`](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/tree/master/examples/single-subscription) - -![single project diagram](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/blob/master/examples/single-subscription/diagram-single.png?raw=true) - -### - Single-Subscription with a pre-existing Kubernetes Cluster - -If you already own a Kubernetes Cluster on GCP, you can use it to deploy Sysdig Secure for Cloud, instead of default -Container Group Instances.
-More info -in [`./examples/single-subscription-k8s`](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/tree/master/examples/single-subscription-k8s) - -### - Tenant-Subscriptions - -Sysdig resources will only be deployed on the Sysdig-designated subscription, but features will be available on all the -Tenant subscriptions (by default), or the ones you select through the input variables.
-More info -in [`./examples/tenant-subscriptions`](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/tree/master/examples/tenant-subscriptions) - -![tenant subscription diagram](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/blob/master/examples/tenant-subscriptions/diagram-tenant.png?raw=true) - -### - Self-Baked - -If no [examples](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/tree/master/examples) fit your -use-case, be free to call desired modules directly. - -In this use-case we will ONLY deploy cloud-bench, into the target account, calling modules directly - -```terraform -terraform { - required_providers { - sysdig = { - source = "sysdiglabs/sysdig" - } - } -} - -provider "azurerm" { - features {} - subscription_id = "SUBSCRIPTION-ID" -} - -data "azurerm_subscription" "current" { -} - -provider "sysdig" { - sysdig_secure_url = var.sysdig_secure_endpoint - sysdig_secure_api_token = var.sysdig_secure_api_token -} - -module "cloud_connector" { - source = "sysdiglabs/secure-for-cloud/azurerm//modules/cloud-connector" - - subscription_id = data.azurerm_subscription.current.subscription_id - resource_group_name = "RESOURCE_GROUP_NAME" - azure_eventhub_connection_string = "EXISTING_EVENTHUB_CONNECTION_STRING" - sysdig_secure_api_token = var.sysdig_secure_api_token -} - -``` - -See [inputs summary](#inputs) or -main [module `variables.tf`](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud/tree/master/variables.tf) -file for more optional configuration. - -To run this example you need have an Azure account and to execute: - -```terraform -$ terraform init -$ terraform plan -$ terraform apply -``` +If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help and improve our module. + +- There are several ways to deploy this in you AWS infrastructure, gathered under **[`/examples`](./examples)** + - [Single Subscription](./examples/single-subscription/README.md) + - [Single Subscription with a pre-existing Kubernetes Cluster](./examples/single-subscription-k8s/README.md) + - [Tenant Subscriptions](./examples/tenant-subscriptions/README.md) + - Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your + infrastructure. Check input summary on each example/module. + ## Forcing Events