Skip to content

Commit c6dae7f

Browse files
committed
SAAS-23305: Updating README.md
1 parent f9cd20d commit c6dae7f

File tree

6 files changed

+40
-41
lines changed

6 files changed

+40
-41
lines changed

README.md

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -5,35 +5,34 @@
55
[![Version](https://img.shields.io/badge/version-1.0.0-blue)](https://github.com/aquasecurity/terraform-gcp-onboarding)
66
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
77

8-
This Terraform module provides an easy way to onboard resources in Google Cloud Platform (GCP) for Aqua Security.
8+
This Terraform module provides an easy way
9+
to configure Aqua Security’s CSPM and agentless solutions on Google Cloud Platform (GCP).
10+
11+
It creates the necessary resources, such as service accounts, roles, and permissions,
12+
to enable seamless integration with Aqua’s platform.
913

1014
---
1115

1216
## Table of Contents
1317

14-
- [Introduction](#introduction)
15-
- [Prerequisites](#prerequisites)
18+
- [Pre-requisites](#Pre-requisites)
1619
- [Usage](#usage)
1720
- [Examples](#examples)
1821
- [Using Existing Network](#using-existing-network-and-firewall)
1922
- [Using Dedicated Project](#using-an-existing-dedicated-project)
20-
- [License](#license)
21-
22-
## Introduction
23-
24-
The `terraform-gcp-onboarding` module simplifies the process of onboarding GCP resources for Aqua Security. It creates the necessary resources, such as service accounts, roles, and permissions, to enable seamless integration with Aqua Security.
2523

26-
## Prerequisites
24+
## Pre-requisites
2725

2826
Before using this module, ensure that you have the following:
2927

30-
- Terraform version `1.6.4` or later
31-
- `gcloud` CLI installed and configured
32-
- `Python` 3+ installed
33-
- Aqua Security account and API credentials
28+
- Terraform version `1.6.4` or later.
29+
- `gcloud` CLI installed and configured.
30+
- `Python` 3+ installed.
31+
- Aqua Security account API credentials.
3432

3533
## Usage
36-
1. Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
34+
1. Leverage the Aqua platform to generate the local variables required by the module.
35+
2. Important: Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
3736
2. Run `terraform init` to initialize the module.
3837
3. Run `terraform apply` to create the resources.
3938

@@ -145,7 +144,12 @@ For more examples and use cases, please refer to the examples folder in the repo
145144

146145
## Using Existing Network and Firewall
147146

148-
If you prefer to use an existing network and firewall instead of creating new ones, you can do so by setting `create_network = false` in the module's input variables. In this case, you will need to follow a specific naming convention for the existing network and firewall resources:
147+
148+
If you prefer to use an existing network and firewall instead of creating new ones,
149+
you can do so by setting `create_network = false` in the module's input variables.
150+
In this case, you will need to create,
151+
prior to onboarding, network and firewall resources with the following naming convention:
152+
149153

150154
* Firewall: `<project_id>-rules-aqua-aas`
151155
* Network: `<project_id>-network`
@@ -155,7 +159,9 @@ When using a dedicated project, the `<project_id>` should follow the format `"aq
155159

156160
## Using an Existing Dedicated Project
157161

158-
If you have an existing dedicated project that you want to use for Aqua Security resources, you can import it into this Terraform configuration. To do so, use the following Terraform import command:
162+
If you have an existing dedicated project that you want to use to host Aqua Security resources, you can import it into the Terraform configuration.
163+
164+
To do so, use the following Terraform import command:
159165

160166
`terraform import module.aqua_gcp_dedicated_project.google_project.project <dedicated_project_id>`
161167

@@ -172,11 +178,6 @@ For example, if your Aqua tenant ID is `12345` and the first six characters of t
172178
You will also need to ensure that the existing dedicated project has the label `"aqua-agentless-scanner" = "true"` applied.
173179

174180

175-
## License
176-
177-
Apache 2 Licensed. See LICENSE for full details.
178-
179-
180181
<!-- BEGIN_TF_DOCS -->
181182
## Requirements
182183

examples/dedicated-project/README.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,30 +2,29 @@
22

33
---
44

5-
This is an example Terraform configuration that demonstrates how to create a dedicated Google Cloud Platform (GCP) project for Aqua Security resources using the `dedicated_project` module from the `terraform-gcp-onboarding` repository.
6-
75
## Overview
86

9-
This example shows how to create a dedicated GCP project with a specific naming convention and apply the required labels for Aqua Security integration.
7+
This example shows how to onboard a GCP project by creating a dedicated project to provision all of Aqua’s resources into and apply the required labels for Aqua Security integration.
108

11-
## Prerequisites
9+
## Pre-requisites
1210

1311
Before running this example, ensure that you have the following:
1412

1513
1. Terraform installed (version 1.6.4 or later).
16-
2. `gcloud` CLI installed and configured.
17-
3. Aqua Security account and API credentials (not required for this example).
14+
2. `Gcloud` CLI installed and configured.
15+
3. Aqua Security account API credentials.
1816

1917
## Usage
2018

21-
1. Replace the placeholder values in the `locals` block with your actual values.
22-
2. Run `terraform init` to initialize the Terraform working directory.
23-
3. Run `terraform apply` to create the dedicated project.
19+
1. Leverage the Aqua platform to generate the local variables required by the module.
20+
2. Important: Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
21+
3. Run `terraform init` to initialize the Terraform working directory.
22+
4. Run `terraform apply` to create the dedicated project.
2423

2524
## What's Happening
26-
27-
1. A dedicated GCP project is created with the name `aqua-agentless-<tenant_id>-<org_hash>`, where `org_hash` is the first six characters of the SHA1 hash of your organization name.
28-
2. The `labels` input is set to merge custom labels (if provided) with the required `"aqua-agentless-scanner" = "true"` label.
25+
1. The `aqua_gcp_dedicated_project` module is called to create a dedicated GCP project is created with the name `aqua-agentless-<tenant_id>-<org_hash>`, where `org_hash` is the first six characters of the SHA1 hash of your organization name.
26+
2. The `aqua_gcp_onboarding` module is called to provision the necessary resources (service accounts, roles, networking, etc.) in the dedicated GCP project.
27+
3. The `aqua_gcp_project_attachment` module is called to create the required IAM resources in the onboarding project and trigger the Aqua API.
2928

3029
## Cleanup
3130

examples/dedicated-project/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ provider "google" {
5050
default_labels = local.labels
5151
}
5252

53-
# Creating onboarding resources on the dedicated project
53+
# Creating discovery and scanning resources on the project
5454
module "aqua_gcp_onboarding" {
5555
source = "../../"
5656
providers = {
@@ -71,7 +71,7 @@ module "aqua_gcp_onboarding" {
7171

7272
################################
7373

74-
## Onboarding an project and attaching it to the dedicated project
74+
## Onboarding a project and attaching it to the dedicated project
7575
module "aqua_gcp_project_attachment" {
7676
source = "../../modules/project_attachment"
7777
providers = {

examples/same-project/README.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22

33
---
44

5-
This is an example Terraform configuration that demonstrates how to onboard Aqua Security resources in an existing Google Cloud Platform (GCP) project using the `terraform-gcp-onboarding` module.
6-
75
## Overview
86

9-
This example showcases the following:
7+
This example shows how to onboard a Google Cloud Platform (GCP) project by provisioning all of Aqua’s resources into the existing project.
108

119
## Prerequisites
1210

@@ -25,7 +23,8 @@ Before running this example, ensure that you have the following:
2523
## What's Happening
2624

2725
1. The `aqua_gcp_onboarding` module is called to provision the necessary resources (service accounts, roles, networking, etc.) in the existing GCP project.
28-
2. The `aqua_gcp_project_attachment` module is called to attach the existing GCP project to the onboarded resources for Aqua Security integration.
26+
2. The `aqua_gcp_project_attachment` module is called to create the required IAM resources in the onboarding project and trigger the Aqua API.
27+
2928

3029
## Cleanup
3130

examples/same-project/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ provider "google" {
3333

3434
################################
3535

36-
# Creating onboarding resources on the existing project
36+
# Creating discovery and scanning resources on the project
3737
module "aqua_gcp_onboarding" {
3838
source = "../.."
3939
providers = {

variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ variable "project_id" {
1010
}
1111

1212
variable "region" {
13-
description = "Google Cloud Region"
13+
description = "Google Cloud Main Deployment Region"
1414
type = string
1515
validation {
1616
condition = can(regex("^[a-z0-9-]{1,35}$", var.region))

0 commit comments

Comments
 (0)