Skip to content

Commit 6da0dd0

Browse files
remove partition and rename role
1 parent eb5a0f6 commit 6da0dd0

File tree

1 file changed

+4
-22
lines changed

1 file changed

+4
-22
lines changed

modules/log_ingestion.s3.cft.yaml

Lines changed: 4 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ Metadata:
2222
- CreateTopic
2323
- TopicARN
2424
- Endpoint
25-
- Partition
2625
- TopicRegion
2726

2827
ParameterLabels:
@@ -50,8 +49,6 @@ Metadata:
5049
default: SNS Topic ARN
5150
Endpoint:
5251
default: Sysdig Secure endpoint
53-
Partition:
54-
default: AWS Partition
5552
TopicRegion:
5653
default: The AWS region where the SNS topic is located
5754

@@ -105,10 +102,6 @@ Parameters:
105102
Endpoint:
106103
Type: String
107104
Description: Sysdig Secure endpoint to receive CloudTrail notifications.
108-
Partition:
109-
Type: String
110-
Description: AWS Partition of your account or organization to create resources in
111-
Default: 'aws'
112105
TopicRegion:
113106
Type: String
114107
Description: The AWS region where the SNS topic is located
@@ -129,10 +122,6 @@ Conditions:
129122
]
130123
IsTopicAccount: !Equals [ !Ref TopicAccountId, !Ref "AWS::AccountId" ]
131124
IsBucketAccount: !Equals [ !Ref BucketAccountId, !Ref "AWS::AccountId" ]
132-
NeedKMSPolicyInTargetAccount:
133-
Fn::And:
134-
- !Condition NeedKMSPolicy
135-
- !Condition BucketInTargetAccount
136125

137126
Resources:
138127
# Role and resources for same-account deployments
@@ -217,7 +206,7 @@ Resources:
217206
Condition: BucketCrossAccount
218207
Properties:
219208
StackSetName: !Sub sysdig-secure-cloudlogs-bucket-access-${NameSuffix}
220-
Description: IAM Role for S3 bucket and KMS access for Sysdig Cloud Logs integration
209+
Description: StackSet to configure S3 bucket and KMS permissions for Sysdig Cloud Logs integration
221210
PermissionModel: SERVICE_MANAGED
222211
AutoDeployment:
223212
Enabled: false
@@ -233,7 +222,7 @@ Resources:
233222
- ParameterKey: NameSuffix
234223
ParameterValue: !Ref NameSuffix
235224
- ParameterKey: RoleName
236-
ParameterValue: !Sub sysdig-secure-cloudlogs-${AWS::AccountId}-${NameSuffix}
225+
ParameterValue: !Sub sysdig-secure-cloudlogs-${NameSuffix}
237226
- ParameterKey: TrustedIdentity
238227
ParameterValue: !Ref TrustedIdentity
239228
- ParameterKey: ExternalID
@@ -362,16 +351,9 @@ Resources:
362351
Protocol: "https"
363352
Endpoint: !Ref Endpoint
364353
Outputs:
365-
TopicARN:
366-
Description: "The ARN of the SNS Topic created for CloudTrail notifications."
367-
Value: !If [ CreateSNSTopic, !Ref CloudTrailNotificationsTopic, !Ref TopicARN ]
368-
CrossAccountRoleARN:
369-
Description: "ARN of the Cross-Account IAM Role for accessing the S3 bucket."
370-
Condition: BucketCrossAccount
371-
Value: !Sub "arn:${Partition}:iam::${BucketAccountId}:role/sysdig-secure-cloudlogs-${AWS::AccountId}-${NameSuffix}"
372354
KMSPolicyInstructions:
373355
Description: "Instructions for updating KMS key policy when KMS encryption is enabled"
374-
Condition: NeedKMSPolicyInTargetAccount
356+
Condition: NeedKMSPolicy
375357
Value: !Sub |
376358
IMPORTANT: MANUAL ACTION REQUIRED
377359
@@ -383,7 +365,7 @@ Outputs:
383365
"Sid": "Sysdig-Decrypt",
384366
"Effect": "Allow",
385367
"Principal": {
386-
"AWS": "${CloudLogsRole.Arn}"
368+
"AWS": "sysdig-secure-cloudlogs-${NameSuffix}"
387369
},
388370
"Action": "kms:Decrypt",
389371
"Resource": "*"

0 commit comments

Comments
 (0)