You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The `terraform-gcp-onboarding` module simplifies the process of onboarding GCP resources for Aqua Security. It creates the necessary resources, such as service accounts, roles, and permissions, to enable seamless integration with Aqua Security.
25
23
26
-
## Prerequisites
24
+
## Pre-requisites
27
25
28
26
Before using this module, ensure that you have the following:
29
27
30
-
- Terraform version `1.6.4` or later
31
-
-`gcloud` CLI installed and configured
32
-
-`Python` 3+ installed
33
-
- Aqua Security account and API credentials
28
+
- Terraform version `1.6.4` or later.
29
+
-`gcloud` CLI installed and configured.
30
+
-`Python` 3+ installed.
31
+
- Aqua Security account API credentials.
34
32
35
33
## Usage
36
-
1. Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
34
+
1. Leverage the Aqua platform to generate the local variables required by the module.
35
+
2. Important: Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
37
36
2. Run `terraform init` to initialize the module.
38
37
3. Run `terraform apply` to create the resources.
39
38
@@ -145,7 +144,12 @@ For more examples and use cases, please refer to the examples folder in the repo
145
144
146
145
## Using Existing Network and Firewall
147
146
148
-
If you prefer to use an existing network and firewall instead of creating new ones, you can do so by setting `create_network = false` in the module's input variables. In this case, you will need to follow a specific naming convention for the existing network and firewall resources:
147
+
148
+
If you prefer to use an existing network and firewall instead of creating new ones,
149
+
you can do so by setting `create_network = false` in the module's input variables.
150
+
In this case, you will need to create,
151
+
prior to onboarding, network and firewall resources with the following naming convention:
152
+
149
153
150
154
* Firewall: `<project_id>-rules-aqua-aas`
151
155
* Network: `<project_id>-network`
@@ -155,7 +159,9 @@ When using a dedicated project, the `<project_id>` should follow the format `"aq
155
159
156
160
## Using an Existing Dedicated Project
157
161
158
-
If you have an existing dedicated project that you want to use for Aqua Security resources, you can import it into this Terraform configuration. To do so, use the following Terraform import command:
162
+
If you have an existing dedicated project that you want to use to host Aqua Security resources, you can import it into the Terraform configuration.
163
+
164
+
To do so, use the following Terraform import command:
Copy file name to clipboardExpand all lines: examples/dedicated-project/README.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,30 +2,29 @@
2
2
3
3
---
4
4
5
-
This is an example Terraform configuration that demonstrates how to create a dedicated Google Cloud Platform (GCP) project for Aqua Security resources using the `dedicated_project` module from the `terraform-gcp-onboarding` repository.
6
-
7
5
## Overview
8
6
9
-
This example shows how to create a dedicated GCP project with a specific naming convention and apply the required labels for Aqua Security integration.
7
+
This example shows how to onboard a GCP project by creating a dedicated project to provision all of Aqua’s resources into and apply the required labels for Aqua Security integration.
10
8
11
-
## Prerequisites
9
+
## Pre-requisites
12
10
13
11
Before running this example, ensure that you have the following:
14
12
15
13
1. Terraform installed (version 1.6.4 or later).
16
-
2.`gcloud` CLI installed and configured.
17
-
3. Aqua Security account and API credentials (not required for this example).
14
+
2.`Gcloud` CLI installed and configured.
15
+
3. Aqua Security account API credentials.
18
16
19
17
## Usage
20
18
21
-
1. Replace the placeholder values in the `locals` block with your actual values.
22
-
2. Run `terraform init` to initialize the Terraform working directory.
23
-
3. Run `terraform apply` to create the dedicated project.
19
+
1. Leverage the Aqua platform to generate the local variables required by the module.
20
+
2. Important: Replace `<aqua_api_key>` and `<aqua_api_secret>` with your generated API credentials.
21
+
3. Run `terraform init` to initialize the Terraform working directory.
22
+
4. Run `terraform apply` to create the dedicated project.
24
23
25
24
## What's Happening
26
-
27
-
1. A dedicated GCP project is created with the name `aqua-agentless-<tenant_id>-<org_hash>`, where `org_hash` is the first six characters of the SHA1 hash of your organization name.
28
-
2. The `labels` input is set to merge custom labels (if provided) with the required `"aqua-agentless-scanner" = "true"` label.
25
+
1. The `aqua_gcp_dedicated_project` module is called to create a dedicated GCP project is created with the name `aqua-agentless-<tenant_id>-<org_hash>`, where `org_hash` is the first six characters of the SHA1 hash of your organization name.
26
+
2. The `aqua_gcp_onboarding` module is called to provision the necessary resources (service accounts, roles, networking, etc.) in the dedicated GCP project.
27
+
3. The `aqua_gcp_project_attachment` module is called to create the required IAM resources in the onboarding project and trigger the Aqua API.
Copy file name to clipboardExpand all lines: examples/same-project/README.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,9 @@
2
2
3
3
---
4
4
5
-
This is an example Terraform configuration that demonstrates how to onboard Aqua Security resources in an existing Google Cloud Platform (GCP) project using the `terraform-gcp-onboarding` module.
6
-
7
5
## Overview
8
6
9
-
This example showcases the following:
7
+
This example shows how to onboard a Google Cloud Platform (GCP) project by provisioning all of Aqua’s resources into the existing project.
10
8
11
9
## Prerequisites
12
10
@@ -25,7 +23,8 @@ Before running this example, ensure that you have the following:
25
23
## What's Happening
26
24
27
25
1. The `aqua_gcp_onboarding` module is called to provision the necessary resources (service accounts, roles, networking, etc.) in the existing GCP project.
28
-
2. The `aqua_gcp_project_attachment` module is called to attach the existing GCP project to the onboarded resources for Aqua Security integration.
26
+
2. The `aqua_gcp_project_attachment` module is called to create the required IAM resources in the onboarding project and trigger the Aqua API.
0 commit comments