You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+33-10
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,19 @@
1
1
# Sysdig Secure for Cloud in GCP
2
2
3
-
Terraform module that deploys the **Sysdig Secure for Cloud** stack in **Google Cloud**.
3
+
Terraform module that deploys the [**Sysdig Secure for Cloud** stack in **Google Cloud**](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-gcp/).
4
4
<br/>It provides unified threat detection, compliance, forensics and analysis.
5
5
6
6
There are three major components:
7
7
8
-
***Cloud Threat Detection**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language. Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-connector).
9
-
<br/><br/>
10
8
***CSPM/Compliance**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix. Managed through [cloud-bench module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-bench).
11
9
<br/><br/>
12
-
***Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account.Managed through [cloud-scanning module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-scanning).
10
+
***Cloud Threat Detection**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language. Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-connector).
11
+
<br/><br/>
12
+
***Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account. Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-google-secure-for-cloud/tree/master/modules/services/cloud-connector).
13
13
<br/><br/>
14
14
15
15
For other Cloud providers check: [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
16
16
17
-
<br/>
18
-
19
17
## Prerequisites
20
18
21
19
You **must** have following **roles** in your GCP credentials
@@ -106,6 +104,33 @@ Notice that:
106
104
107
105
108
106
<br/><br/>
107
+
108
+
109
+
## Forcing Events
110
+
111
+
**Threat Detection**
112
+
113
+
Choose one of the rules contained in the `GCP Best Practices` policy and execute it in your GCP account.
114
+
ex.: Create an alert (Monitoring > Alerting > Create policy). Delete it to prompt the event.
115
+
116
+
Remember that in case you add new rules to the policy you need to give it time to propagate the changes.
117
+
118
+
In the `cloud-connector` logs you should see similar logs to these
119
+
> An alert has been deleted (requesting user=..., requesting IP=..., resource name=projects/test/alertPolicies/3771445340801051512)
120
+
121
+
**Image Scanning**
122
+
123
+
Upload an image to a new Repository in a Artifact Registry. Follow repository `Setup Instructions` provided by GCP
124
+
```bash
125
+
$ docker tag REPO_REGION-docker.pkg.dev/PROJECT-ID/REPOSITORY/IMAGE:latest
In the `cloud-connector` logs you should see similar logs to these
130
+
> An image has been pushed to GCR registry (project=..., tag=europe-west2-docker.pkg.dev/test-repo/alpine/alpine:latest, digest=europe-west2-docker.pkg.dev/test-repo/alpine/alpine@sha256:be9bdc0ef8e96dbc428dc189b31e2e3b05523d96d12ed627c37aa2936653258c)
A2: Verify that `gcr` topic exists. If `create_gcr_topic` is set to false and `gcr` topic is not found, the GCR scanning is ommited and won't be deployed. For more info see GCR PubSub topic.
130
-
155
+
<br/><br/>
131
156
- Q3: Scanning, I get an error saying:
132
157
```
133
158
error starting scan runner for image ****: rpc error: code = PermissionDenied desc = Cloud Build API has not been used in project *** before or it is disabled.
@@ -136,9 +161,7 @@ Notice that:
136
161
If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry
137
162
```
138
163
A3: Do as the error says and activate CloudBuild API. Check the list of all the required APIs that need to be activated per feature module.
139
-
140
-
141
-
<br/><br/><br/>
164
+
<br/><br/>
142
165
## Authors
143
166
144
167
Module is maintained and supported by [Sysdig](https://sysdig.com).
|[google_client_config.current](https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/client_config)| data source |
54
59
|[google_project.project](https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/project)| data source |
55
60
56
61
## Inputs
@@ -68,7 +73,6 @@ No modules.
68
73
| <aname="input_config_source"></a> [config\_source](#input\_config\_source)| Path to a file that contains the contents of the configuration file to be saved in the bucket |`string`|`null`| no |
69
74
| <aname="input_extra_envs"></a> [extra\_envs](#input\_extra\_envs)| Extra environment variables for the Cloud Connector instance |`map(string)`|`{}`| no |
70
75
| <aname="input_image_name"></a> [image\_name](#input\_image\_name)| Cloud Connector image to deploy |`string`|`"gcr.io/mateo-burillo-ns/cloud-connector:latest"`| no |
71
-
| <aname="input_location"></a> [location](#input\_location)| Zone where the cloud connector will be deployed |`string`|`"us-central1"`| no |
72
76
| <aname="input_max_instances"></a> [max\_instances](#input\_max\_instances)| Max number of instances for the Cloud Connector |`number`|`1`| no |
73
77
| <aname="input_name"></a> [name](#input\_name)| Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances |`string`|`"sfc-cloudconnector"`| no |
74
78
| <aname="input_verify_ssl"></a> [verify\_ssl](#input\_verify\_ssl)| Verify the SSL certificate of the Secure endpoint |`bool`|`true`| no |
0 commit comments