We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 28a785f commit 9d5fa08Copy full SHA for 9d5fa08
modules/integrations/cloud-logs/templates/kms_policy_instructions.tpl
@@ -1,7 +1,6 @@
1
IMPORTANT: MANUAL ACTION REQUIRED
2
3
-Please add the following statement to your KMS key policy to allow Sysdig to decrypt logs.
4
-This is necessary when KMS encryption is enabled for your S3 bucket.
+Add the following statement to the KMS key policy used by CloudTrail
5
Without this policy addition, Sysdig may not be able to read your encrypted logs.
6
7
{
modules/integrations/cloud-logs/versions.tf
@@ -3,8 +3,9 @@ terraform {
required_providers {
aws = {
- source = "hashicorp/aws"
- version = ">= 5.60.0"
+ source = "hashicorp/aws"
+ version = ">= 5.60.0"
8
+ configuration_aliases = [aws.sns]
9
}
10
sysdig = {
11
source = "sysdiglabs/sysdig"
0 commit comments