You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,9 +135,9 @@ A: On your Google Cloud account, search for "APIs & Services > Enabled APIs & Se
135
135
$ gcloud services list --enabled
136
136
```
137
137
138
-
### Q: Getting "googleapi: 403 Permission *** denied for resource"
138
+
### Q: Getting "googleapi: 403 ***"
139
139
A: This may happen because permissions are not enough, API services were not correctly enabled, or you're not correctly authenticated for terraform google prolvider.
140
-
<br/>S: Verify [permissions](#prerequisites), [api-services](apis), and that the [Terraform Google Provider](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#configuring-the-provider) authentication has been correctly setup.
140
+
<br/>S: Verify [permissions](#prerequisites), [api-services](#apis), and that the [Terraform Google Provider](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#configuring-the-provider) authentication has been correctly setup.
141
141
You can also launch the following terraform manifest to check whether you're authenticated with what you expect
Contact us to develop a workaround for this, where the topic name is to be reused.
226
228
229
+
Note: if you're using terragrunt, run `terragrunt import`
227
230
228
231
### Q: Getting "Cloud Run error: Container failed to start. Failed to start and then listen on the port defined by the PORT environment variable."
229
232
A: If cloud-connector cloud run module cannot start it will give this error. The error is given by the health-check system, it's not specific to its PORT per-se
@@ -253,19 +256,21 @@ A: Verify that `gcr` topic exists. If `create_gcr_topic` is set to false and `gc
253
256
254
257
## Upgrading
255
258
256
-
- Uninstall previous deployment resources before upgrading
259
+
1. Uninstall previous deployment resources before upgrading
257
260
```
258
261
$ terraform destroy
259
262
```
260
263
261
-
- Upgrade the full terraform example with
264
+
2. Upgrade the full terraform example with
262
265
```
263
266
$ terraform init -upgrade
264
267
$ terraform plan
265
268
$ terraform apply
266
269
```
267
270
268
-
- If required, you can upgrade cloud-connector component by restarting the task (stop task). Because it's not pinned to an specific version, it will download the latest one.
271
+
- If the event-source is created throuh SFC, some events may get lost while upgrading with this approach. however, if the cloudtrail is re-used (normal production setup) events will be recovered once the ingestion resumes.
272
+
273
+
- If required, you can upgrade cloud-connector component by restarting the task (stop task). Because it's not pinned to an specific version, it will download the `latest` one.
# Why: Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
19
+
# How to avoid security issues: As in the next implementation scanning will be run from within cloudrun which has needed permissions and won't need a token.
20
+
# Warning: Organization users musn't be able to impersonate as the created service account.
21
+
#ts:skip=AC_GCP_0006 Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
# Why: Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
5
+
# How to avoid security issues: As in the next implementation scanning will be run from within cloudrun which has needed permissions and won't need a token.
6
+
# Warning: Organization users musn't be able to impersonate as the created service account.
7
+
#ts:skip=AC_GCP_0006 Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
Copy file name to clipboardExpand all lines: modules/services/cloud-connector/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ No modules.
64
64
| <aname="input_cpu"></a> [cpu](#input\_cpu)| Amount of CPU to reserve for cloud-connector cloud run service |`string`|`"1"`| no |
65
65
| <aname="input_deploy_scanning"></a> [deploy\_scanning](#input\_deploy\_scanning)| true/false whether scanning module is to be deployed |`bool`|`false`| no |
66
66
| <aname="input_extra_envs"></a> [extra\_envs](#input\_extra\_envs)| Extra environment variables for the Cloud Connector instance |`map(string)`|`{}`| no |
67
-
| <aname="input_image_name"></a> [image\_name](#input\_image\_name)| Sysdig Owned Cloud Connector public image. GCP only allows the deployment of images that are registered in gcr.io |`string`|`"gcr.io/mateo-burillo-ns/cloud-connector:latest"`| no |
67
+
| <aname="input_image_name"></a> [image\_name](#input\_image\_name)| Sysdig Owned Cloud Connector public image. GCP only allows the deployment of images that are registered in gcr.io |`string`|`"us-docker.pkg.dev/sysdig-public-registry/secure-for-cloud/cloud-connector:latest"`| no |
68
68
| <aname="input_is_organizational"></a> [is\_organizational](#input\_is\_organizational)| whether secure-for-cloud should be deployed in an organizational setup |`bool`|`false`| no |
69
69
| <aname="input_max_instances"></a> [max\_instances](#input\_max\_instances)| Max number of instances for the Cloud Connector |`number`|`1`| no |
70
70
| <aname="input_memory"></a> [memory](#input\_memory)| Amount of memory to reserve for cloud-connector cloud run service |`string`|`"500Mi"`| no |
# Why: Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
10
+
# How to avoid security issues: As in the next implementation scanning will be run from within cloudrun which has needed permissions and won't need a token.
11
+
# Warning: Organization users musn't be able to impersonate as the created service account.
12
+
#ts:skip=AC_GCP_0006 Image scanning is run from inside a container. As it needs to get the image from the registry it needs a token to get it from the registry.
0 commit comments