|
1 | 1 | # Sysdig Secure for Cloud in GCP
|
2 | 2 |
|
3 | 3 | Terraform module that deploys the [**Sysdig Secure for Cloud** stack in **Google Cloud**](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-gcp/).
|
4 |
| -<br/>It provides unified threat detection, compliance, forensics and analysis. |
| 4 | +<br/> |
5 | 5 |
|
6 |
| -There are three major components: |
| 6 | +Provides unified threat-detection, compliance, forensics and analysis through these major components: |
| 7 | + |
| 8 | +* **[CSPM/Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/benchmarks/)**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix. Managed through `cloud-bench` module. <br/> |
| 9 | + |
| 10 | +* **[CIEM](https://docs.sysdig.com/en/docs/sysdig-secure/posture/)**: Permissions and Entitlements management. Requires BOTH modules `cloud-connector` and `cloud-bench`. <br/> |
| 11 | + |
| 12 | +* **[Cloud Threat Detection](https://docs.sysdig.com/en/docs/sysdig-secure/insights/)**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language. Managed through `cloud-connector` module. <br/> |
| 13 | + |
| 14 | +* **[Cloud Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/)**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account. Managed through `cloud-connector`. <br/> |
7 | 15 |
|
8 |
| -* **CSPM/Compliance**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix. Managed through [cloud-bench module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-bench). |
9 |
| - <br/><br/> |
10 |
| -* **Cloud Threat Detection**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language. Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-connector). |
11 |
| -<br/><br/> |
12 |
| -* **Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account. Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-connector). |
13 |
| - <br/><br/> |
14 | 16 |
|
15 | 17 | For other Cloud providers check: [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
|
16 | 18 |
|
@@ -133,38 +135,40 @@ In the `cloud-connector` logs you should see similar logs to these
|
133 | 135 |
|
134 | 136 | ## Troubleshooting
|
135 | 137 |
|
136 |
| -### Q1: Getting "Error creating WorkloadIdentityPool: googleapi: Error 409: Requested entity already exists"<br/> |
137 |
| - A1: Currently Sysdig Backend does not support dynamic WorkloadPool and it's name is fixed to `sysdiglcoud`. |
138 |
| - <br/>Besides, Google, only performs a soft-deletion of this resource. |
139 |
| - https://cloud.google.com/iam/docs/manage-workload-identity-pools-providers#delete-pool |
| 138 | +### Q: Getting "Error creating WorkloadIdentityPool: googleapi: Error 409: Requested entity already exists"<br/> |
| 139 | +A: Currently Sysdig Backend does not support dynamic WorkloadPool and it's name is fixed to `sysdiglcoud`. |
| 140 | +<br/>Besides, Google, only performs a soft-deletion of this resource. |
| 141 | +https://cloud.google.com/iam/docs/manage-workload-identity-pools-providers#delete-pool |
140 | 142 |
|
141 | 143 | > You can undelete a pool for up to 30 days after deletion. After 30 days, deletion is permanent. Until a pool is permanently deleted, you cannot reuse its name when creating a new workload identity pool.<br/>
|
142 | 144 |
|
143 |
| - S1: For the moment, federation workload identity pool+provider have fixed name. In case you want to reuse it, you can reactivate and import it, into your terraform state manually. |
144 |
| - ```bash |
145 |
| - # re-activate pool and provider |
146 |
| - $ gcloud iam workload-identity-pools undelete sysdigcloud --location=global |
147 |
| - $ gcloud iam workload-identity-pools providers undelete sysdigcloud --workload-identity-pool="sysdigcloud" --location=global |
| 145 | +S: For the moment, federation workload identity pool+provider have fixed name. In case you want to reuse it, you can reactivate and import it, into your terraform state manually. |
| 146 | +```bash |
| 147 | +# re-activate pool and provider |
| 148 | +$ gcloud iam workload-identity-pools undelete sysdigcloud --location=global |
| 149 | +$ gcloud iam workload-identity-pools providers undelete sysdigcloud --workload-identity-pool="sysdigcloud" --location=global |
| 150 | +
|
| 151 | +# import to terraform state |
| 152 | +# input your project-id, and for organization example, change the import resource accordingly |
| 153 | +$ terraform import 'module.sfc_example_single-project.module.cloud_bench[0].module.trust_relationship["<YOUR_PROJECT_ID>"].google_iam_workload_identity_pool.pool' sysdigcloud |
| 154 | +$ terraform import 'module.sfc_example_single-project.module.cloud_bench[0].module.trust_relationship["<YOUR_PROJECT_ID>"].google_iam_workload_identity_pool_provider.pool_provider' sysdigcloud/sysdigcloud |
| 155 | + ``` |
| 156 | + |
| 157 | +### Q: Scanning does not seem to work<br/> |
| 158 | +A: Verify that `gcr` topic exists. If `create_gcr_topic` is set to false and `gcr` topic is not found, the GCR scanning is ommited and won't be deployed. For more info see GCR PubSub topic. |
| 159 | +<br/><br/> |
148 | 160 |
|
149 |
| - # import to terraform state |
150 |
| - # input your project-id, and for organization example, change the import resource accordingly |
151 |
| - $ terraform import 'module.sfc_example_single-project.module.cloud_bench[0].module.trust_relationship["<YOUR_PROJECT_ID>"].google_iam_workload_identity_pool.pool' sysdigcloud |
152 |
| - $ terraform import 'module.sfc_example_single-project.module.cloud_bench[0].module.trust_relationship["<YOUR_PROJECT_ID>"].google_iam_workload_identity_pool_provider.pool_provider' sysdigcloud/sysdigcloud |
153 |
| - ``` |
| 161 | +### Q: Scanning, I get an error saying: |
| 162 | +``` |
| 163 | +error starting scan runner for image ****: rpc error: code = PermissionDenied desc = Cloud Build API has not been used in project *** before or it is disabled. |
| 164 | +Enable it by visiting https://console.developers.google.com/apis/api/cloudbuild.googleapis.com/overview?project=*** then retry. |
154 | 165 |
|
155 |
| -### Q2: Scanning does not seem to work<br/> |
156 |
| - A2: Verify that `gcr` topic exists. If `create_gcr_topic` is set to false and `gcr` topic is not found, the GCR scanning is ommited and won't be deployed. For more info see GCR PubSub topic. |
| 166 | +If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry |
| 167 | +``` |
| 168 | +A: Do as the error says and activate CloudBuild API. Check the list of all the required APIs that need to be activated per feature module. |
157 | 169 | <br/><br/>
|
158 | 170 |
|
159 |
| -### Q3: Scanning, I get an error saying: |
160 |
| - ``` |
161 |
| - error starting scan runner for image ****: rpc error: code = PermissionDenied desc = Cloud Build API has not been used in project *** before or it is disabled. |
162 |
| - Enable it by visiting https://console.developers.google.com/apis/api/cloudbuild.googleapis.com/overview?project=*** then retry. |
163 | 171 |
|
164 |
| - If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry |
165 |
| - ``` |
166 |
| - A3: Do as the error says and activate CloudBuild API. Check the list of all the required APIs that need to be activated per feature module. |
167 |
| -<br/><br/> |
168 | 172 | ## Authors
|
169 | 173 |
|
170 | 174 | Module is maintained and supported by [Sysdig](https://sysdig.com).
|
|
0 commit comments