diff --git a/.go-version b/.go-version index 71bd5d9e..84cc5294 100644 --- a/.go-version +++ b/.go-version @@ -1 +1 @@ -1.16.0 \ No newline at end of file +1.18.0 diff --git a/README.md b/README.md index eb47bc01..0a922b03 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ Further [usage documentation is available on the Terraform website](https://www. Developing the Provider --------------------------- -If you wish to work on the provider, you'll first need [Go](http://www.golang.org) installed on your machine (version 1.11+ is *required*). You'll also need to correctly setup a [GOPATH](http://golang.org/doc/code.html#GOPATH), as well as adding `$GOPATH/bin` to your `$PATH`. +If you wish to work on the provider, you'll first need [Go](http://www.golang.org) installed on your machine (version 1.18+ is *required*). You'll also need to correctly setup a [GOPATH](http://golang.org/doc/code.html#GOPATH), as well as adding `$GOPATH/bin` to your `$PATH`. To compile the provider, run `make build`. This will build the provider and put the provider binary in the `$GOPATH/bin` directory. diff --git a/examples/resource_lacework_integration_aws_eks_audit_log/main.tf b/examples/resource_lacework_integration_aws_eks_audit_log/main.tf new file mode 100644 index 00000000..d49eb0fa --- /dev/null +++ b/examples/resource_lacework_integration_aws_eks_audit_log/main.tf @@ -0,0 +1,53 @@ +terraform { + required_providers { + lacework = { + source = "lacework/lacework" + } + } +} + +variable "name" { + type = string + default = "AWS EKS audit log integration example" +} + +variable "sns_arn" { + type = string + default = "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks" +} + +variable "external_id" { + type = string + default = "12345" +} + +variable "role_arn" { + type = string + default = "arn:aws:iam::249446771485:role/lacework-iam-example-role" +} + +resource "lacework_integration_aws_eks_audit_log" "example" { + name = var.name + sns_arn = var.sns_arn + credentials { + role_arn = var.role_arn + external_id = var.external_id + } + retries = 10 +} + +output "name" { + value = lacework_integration_aws_eks_audit_log.example.name +} + +output "sns_arn" { + value = lacework_integration_aws_eks_audit_log.example.sns_arn +} + +output "role_arn" { + value = lacework_integration_aws_eks_audit_log.example.credentials[0].role_arn +} + +output "external_id" { + value = lacework_integration_aws_eks_audit_log.example.credentials[0].external_id +} diff --git a/integration/integration.go b/integration/integration.go index e7794472..5c0e6d71 100644 --- a/integration/integration.go +++ b/integration/integration.go @@ -45,6 +45,29 @@ func lwOrgTestClient() (lw *api.Client) { return } +func GetCloudAccountIntegrationName(result string) string { + var res api.CloudAccountResponse + id := GetIDFromTerraResults(result) + + err := LwClient.V2.CloudAccounts.Get(id, &res) + if err != nil { + log.Fatalf("Unable to find integration id: %s\n Response: %v", id, res) + } + + return res.Data.Name +} + +func GetCloudAccountEksAuditLogData(result string) api.AwsEksAuditData { + id := GetIDFromTerraResults(result) + + response, err := LwClient.V2.CloudAccounts.GetAwsEksAudit(id) + if err != nil { + log.Fatalf("Unable to find eks audit log id: %s\n Response: %v", id, response) + } + + return response.Data.Data +} + func GetIntegrationName(result string, integration string) string { var res api.V2CommonIntegration id := GetIDFromTerraResults(result) diff --git a/integration/resource_lacework_integration_aws_eks_audit_log_test.go b/integration/resource_lacework_integration_aws_eks_audit_log_test.go new file mode 100644 index 00000000..0601f913 --- /dev/null +++ b/integration/resource_lacework_integration_aws_eks_audit_log_test.go @@ -0,0 +1,68 @@ +package integration + +import ( + "testing" + + "github.com/gruntwork-io/terratest/modules/terraform" + "github.com/stretchr/testify/assert" +) + +// TestIntegrationAwsEksAuditLog applies integration terraform: +// => '../examples/resource_lacework_integration_aws_eks_audit_log' +// +// It uses the go-sdk to verify the created integration, +// applies an update with new integration name and destroys it +func TestIntegrationAwsEksAuditLog(t *testing.T) { + terraformOptions := terraform.WithDefaultRetryableErrors(t, &terraform.Options{ + TerraformDir: "../examples/resource_lacework_integration_aws_eks_audit_log", + Vars: map[string]interface{}{ + "role_arn": "arn:aws:iam::249446771485:role/lacework-iam-example-role", + "external_id": "12345", + "sns_arn": "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", + }, + }) + defer terraform.Destroy(t, terraformOptions) + + // Create new AwsEksAudit Integration + create := terraform.InitAndApplyAndIdempotent(t, terraformOptions) + createData := GetCloudAccountEksAuditLogData(create) + actualRoleArn := terraform.Output(t, terraformOptions, "role_arn") + actualExternalId := terraform.Output(t, terraformOptions, "external_id") + actualSnsArn := terraform.Output(t, terraformOptions, "sns_arn") + assert.Equal( + t, + "AWS EKS audit log integration example", + GetCloudAccountIntegrationName(create), + ) + assert.Equal(t, "arn:aws:iam::249446771485:role/lacework-iam-example-role", createData.Credentials.RoleArn) + assert.Equal(t, "12345", createData.Credentials.ExternalID) + assert.Equal(t, "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", createData.SnsArn) + assert.Equal(t, "arn:aws:iam::249446771485:role/lacework-iam-example-role", actualRoleArn) + assert.Equal(t, "12345", actualExternalId) + assert.Equal(t, "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", actualSnsArn) + + // Update AwsEksAudit Integration + terraformOptions.Vars = map[string]interface{}{ + "name": "AwsEksAudit log integration updated", + "role_arn": "arn:aws:iam::249446771485:role/lacework-iam-example-role", + "external_id": "12345", + "sns_arn": "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", + } + + update := terraform.ApplyAndIdempotent(t, terraformOptions) + updateData := GetCloudAccountEksAuditLogData(update) + actualRoleArn = terraform.Output(t, terraformOptions, "role_arn") + actualExternalId = terraform.Output(t, terraformOptions, "external_id") + actualSnsArn = terraform.Output(t, terraformOptions, "sns_arn") + assert.Equal( + t, + "AwsEksAudit log integration updated", + GetCloudAccountIntegrationName(update), + ) + assert.Equal(t, "arn:aws:iam::249446771485:role/lacework-iam-example-role", updateData.Credentials.RoleArn) + assert.Equal(t, "12345", updateData.Credentials.ExternalID) + assert.Equal(t, "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", updateData.SnsArn) + assert.Equal(t, "arn:aws:iam::249446771485:role/lacework-iam-example-role", actualRoleArn) + assert.Equal(t, "12345", actualExternalId) + assert.Equal(t, "arn:aws:sns:us-west-2:123456789123:foo-lacework-eks", actualSnsArn) +} diff --git a/lacework/provider.go b/lacework/provider.go index 409d4e5d..79adf4ab 100644 --- a/lacework/provider.go +++ b/lacework/provider.go @@ -81,6 +81,7 @@ func Provider() *schema.Provider { "lacework_alert_rule": resourceLaceworkAlertRule(), "lacework_integration_aws_cfg": resourceLaceworkIntegrationAwsCfg(), "lacework_integration_aws_ct": resourceLaceworkIntegrationAwsCloudTrail(), + "lacework_integration_aws_eks_audit_log": resourceLaceworkIntegrationAwsEksAuditLog(), "lacework_integration_aws_govcloud_cfg": resourceLaceworkIntegrationAwsGovCloudCfg(), "lacework_integration_aws_govcloud_ct": resourceLaceworkIntegrationAwsGovCloudCT(), "lacework_integration_azure_cfg": resourceLaceworkIntegrationAzureCfg(), diff --git a/lacework/resource_lacework_integration_aws_ct.go b/lacework/resource_lacework_integration_aws_ct.go index 46038d19..f03da425 100644 --- a/lacework/resource_lacework_integration_aws_ct.go +++ b/lacework/resource_lacework_integration_aws_ct.go @@ -12,6 +12,17 @@ import ( "github.com/lacework/go-sdk/api" ) +func resourceLaceworkIntegrationAwsCloudTrail() *schema.Resource { + return &schema.Resource{ + Create: resourceLaceworkIntegrationAwsCloudTrailCreate, + Read: resourceLaceworkIntegrationAwsCloudTrailRead, + Update: resourceLaceworkIntegrationAwsCloudTrailUpdate, + Delete: resourceLaceworkIntegrationAwsCloudTrailDelete, + Schema: awsCloudTrailIntegrationSchema, + Importer: &schema.ResourceImporter{State: importLaceworkIntegration}, + } +} + var awsCloudTrailIntegrationSchema = map[string]*schema.Schema{ "name": { Type: schema.TypeString, @@ -111,17 +122,6 @@ var awsCloudTrailIntegrationSchema = map[string]*schema.Schema{ }, } -func resourceLaceworkIntegrationAwsCloudTrail() *schema.Resource { - return &schema.Resource{ - Create: resourceLaceworkIntegrationAwsCloudTrailCreate, - Read: resourceLaceworkIntegrationAwsCloudTrailRead, - Update: resourceLaceworkIntegrationAwsCloudTrailUpdate, - Delete: resourceLaceworkIntegrationAwsCloudTrailDelete, - Schema: awsCloudTrailIntegrationSchema, - Importer: &schema.ResourceImporter{State: importLaceworkIntegration}, - } -} - func resourceLaceworkIntegrationAwsCloudTrailCreate(d *schema.ResourceData, meta interface{}) error { var ( lacework = meta.(*api.Client) diff --git a/lacework/resource_lacework_integration_aws_eks_audit_log.go b/lacework/resource_lacework_integration_aws_eks_audit_log.go new file mode 100644 index 00000000..ec1d46c3 --- /dev/null +++ b/lacework/resource_lacework_integration_aws_eks_audit_log.go @@ -0,0 +1,237 @@ +package lacework + +import ( + "context" + "fmt" + "log" + + "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" + "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" + + "github.com/lacework/go-sdk/api" +) + +func resourceLaceworkIntegrationAwsEksAuditLog() *schema.Resource { + return &schema.Resource{ + Create: resourceLaceworkIntegrationAwsEksAuditLogCreate, + Read: resourceLaceworkIntegrationAwsEksAuditLogRead, + Update: resourceLaceworkIntegrationAwsEksAuditLogUpdate, + Delete: resourceLaceworkIntegrationAwsEksAuditLogDelete, + Schema: awsEksAuditLogIntegrationSchema, + Importer: &schema.ResourceImporter{State: importLaceworkIntegration}, + } +} + +var awsEksAuditLogIntegrationSchema = map[string]*schema.Schema{ + "name": { + Type: schema.TypeString, + Required: true, + Description: "The integration name.", + }, + "enabled": { + Type: schema.TypeBool, + Optional: true, + Default: true, + Description: "The state of the external integration.", + }, + "retries": { + Type: schema.TypeInt, + Optional: true, + Default: 5, + Description: "The number of attempts to create the external integration.", + }, + "sns_arn": { + Type: schema.TypeString, + Required: true, + Description: "The SNS ARN.", + }, + "credentials": { + Type: schema.TypeList, + MaxItems: 1, + Required: true, + Description: "The credentials needed by the integration.", + Elem: &schema.Resource{ + Schema: map[string]*schema.Schema{ + "role_arn": { + Type: schema.TypeString, + Required: true, + }, + "external_id": { + Type: schema.TypeString, + Required: true, + }, + }, + }, + }, + "type_name": { + Type: schema.TypeString, + Computed: true, + }, + "intg_guid": { + Type: schema.TypeString, + Computed: true, + }, + "is_org": { + Type: schema.TypeBool, + Computed: true, + }, + "created_or_updated_time": { + Type: schema.TypeString, + Computed: true, + }, + "created_or_updated_by": { + Type: schema.TypeString, + Computed: true, + }, +} + +func resourceLaceworkIntegrationAwsEksAuditLogCreate(d *schema.ResourceData, meta interface{}) error { + var ( + lacework = meta.(*api.Client) + retries = d.Get("retries").(int) + awsEksAuditLogData = api.AwsEksAuditData{ + SnsArn: d.Get("sns_arn").(string), + Credentials: api.AwsEksAuditCredentials{ + RoleArn: d.Get("credentials.0.role_arn").(string), + ExternalID: d.Get("credentials.0.external_id").(string), + }, + } + ) + + awsEksAuditLog := api.NewCloudAccount(d.Get("name").(string), + api.AwsEksAuditCloudAccount, + awsEksAuditLogData, + ) + + if !d.Get("enabled").(bool) { + awsEksAuditLog.Enabled = 0 + } + + return resource.RetryContext(context.Background(), d.Timeout(schema.TimeoutCreate), func() *resource.RetryError { + retries-- + log.Printf("[INFO] Creating %s cloud account integration\n", api.AwsEksAuditCloudAccount.String()) + response, err := lacework.V2.CloudAccounts.Create(awsEksAuditLog) + if err != nil { + if retries <= 0 { + return resource.NonRetryableError( + fmt.Errorf("error creating %s cloud account integration: %s", + api.AwsEksAuditCloudAccount.String(), err, + )) + } + log.Printf( + "[INFO] Unable to create %s cloud account integration. (retrying %d more time(s))\n%s\n", + api.AwsEksAuditCloudAccount.String(), retries, err, + ) + return resource.RetryableError(fmt.Errorf( + "unable to create %s cloud account integration (retrying %d more time(s))", + api.AwsEksAuditCloudAccount.String(), retries, + )) + } + + cloudAccount := response.Data + d.SetId(cloudAccount.IntgGuid) + d.Set("name", cloudAccount.Name) + d.Set("intg_guid", cloudAccount.IntgGuid) + d.Set("enabled", cloudAccount.Enabled == 1) + + d.Set("created_or_updated_time", cloudAccount.CreatedOrUpdatedTime) + d.Set("created_or_updated_by", cloudAccount.CreatedOrUpdatedBy) + d.Set("type_name", cloudAccount.Type) // @afiune should we deprecate? + d.Set("org_level", cloudAccount.IsOrg == 1) + + log.Printf("[INFO] Created %s cloud account integration with guid: %v\n", + api.AwsEksAuditCloudAccount.String(), cloudAccount.IntgGuid) + return nil + }) +} + +func resourceLaceworkIntegrationAwsEksAuditLogRead(d *schema.ResourceData, meta interface{}) error { + lacework := meta.(*api.Client) + + log.Printf("[INFO] Reading %s cloud account integration with guid: %v\n", api.AwsEksAuditCloudAccount.String(), d.Id()) + response, err := lacework.V2.CloudAccounts.GetAwsEksAudit(d.Id()) + if err != nil { + return err + } + + cloudAccount := response.Data + if cloudAccount.IntgGuid == d.Id() { + d.Set("name", cloudAccount.Name) + d.Set("intg_guid", cloudAccount.IntgGuid) + d.Set("enabled", cloudAccount.Enabled == 1) + d.Set("created_or_updated_time", cloudAccount.CreatedOrUpdatedTime) + d.Set("created_or_updated_by", cloudAccount.CreatedOrUpdatedBy) + d.Set("type_name", cloudAccount.Type) + d.Set("org_level", cloudAccount.IsOrg == 1) + + creds := make(map[string]string) + credentials := cloudAccount.Data.Credentials + creds["role_arn"] = credentials.RoleArn + creds["external_id"] = credentials.ExternalID + d.Set("credentials", []map[string]string{creds}) + d.Set("snsArn", cloudAccount.Data.SnsArn) + + log.Printf("[INFO] Read %s cloud account integration with guid: %v\n", + api.AwsEksAuditCloudAccount.String(), cloudAccount.IntgGuid, + ) + return nil + } + + d.SetId("") + return nil +} + +func resourceLaceworkIntegrationAwsEksAuditLogUpdate(d *schema.ResourceData, meta interface{}) error { + var ( + lacework = meta.(*api.Client) + awsEksAuditLogData = api.AwsEksAuditData{ + SnsArn: d.Get("sns_arn").(string), + Credentials: api.AwsEksAuditCredentials{ + RoleArn: d.Get("credentials.0.role_arn").(string), + ExternalID: d.Get("credentials.0.external_id").(string), + }, + } + ) + + awsEksAuditLog := api.NewCloudAccount(d.Get("name").(string), + api.AwsEksAuditCloudAccount, + awsEksAuditLogData, + ) + + if !d.Get("enabled").(bool) { + awsEksAuditLog.Enabled = 0 + } + + awsEksAuditLog.IntgGuid = d.Id() + + log.Printf("[INFO] Updating %s integration with data:\n%+v\n", api.AwsEksAuditCloudAccount.String(), awsEksAuditLog.IntgGuid) + response, err := lacework.V2.CloudAccounts.UpdateAwsEksAudit(awsEksAuditLog) + if err != nil { + return err + } + + cloudAccount := response.Data + d.Set("name", cloudAccount.Name) + d.Set("intg_guid", cloudAccount.IntgGuid) + d.Set("enabled", cloudAccount.Enabled == 1) + d.Set("created_or_updated_time", cloudAccount.CreatedOrUpdatedTime) + d.Set("created_or_updated_by", cloudAccount.CreatedOrUpdatedBy) + d.Set("type_name", cloudAccount.Type) + d.Set("org_level", cloudAccount.IsOrg == 1) + + log.Printf("[INFO] Updated %s cloud account integration with guid: %v\n", api.AwsEksAuditCloudAccount.String(), d.Id()) + return nil +} + +func resourceLaceworkIntegrationAwsEksAuditLogDelete(d *schema.ResourceData, meta interface{}) error { + lacework := meta.(*api.Client) + + log.Printf("[INFO] Deleting %s cloud account integration with guid: %v\n", api.AwsEksAuditCloudAccount.String(), d.Id()) + err := lacework.V2.CloudAccounts.Delete(d.Id()) + if err != nil { + return err + } + + log.Printf("[INFO] Deleted %s cloud account integration with guid: %v\n", api.AwsEksAuditCloudAccount.String(), d.Id()) + return nil +} diff --git a/lacework/resource_lacework_integration_aws_eks_audit_log_test.go b/lacework/resource_lacework_integration_aws_eks_audit_log_test.go new file mode 100644 index 00000000..72d4b7ad --- /dev/null +++ b/lacework/resource_lacework_integration_aws_eks_audit_log_test.go @@ -0,0 +1,144 @@ +package lacework + +import ( + "fmt" + "os" + "testing" + + "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" + "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" + + "github.com/lacework/go-sdk/api" +) + +const ( + testAccIntegrationAwsEksAuditResourceType = "lacework_integration_aws_eks_audit_log" + testAccIntegrationAwsEksAuditResourceName = "example" + + // Environment variables for testing AWS_EKS_AUDIT only + testAccIntegrationAwsEnvSnsArn = "sns:arn" +) + +func TestAccIntegrationAwsEksAudit(t *testing.T) { + resourceTypeAndName := fmt.Sprintf("%s.%s", + testAccIntegrationAwsEksAuditResourceType, + testAccIntegrationAwsEksAuditResourceName, + ) + + resource.Test(t, resource.TestCase{ + PreCheck: func() { + testAccPreCheck(t) + testAccIntegrationAwsEksAuditEnvVarsPreCheck(t) + }, + Providers: testAccProviders, + CheckDestroy: testAccCheckIntegrationAwsEksAuditDestroy, + Steps: []resource.TestStep{ + { + Config: testAccIntegrationAwsEksAuditConfig( + true, + ), + Check: resource.ComposeTestCheckFunc( + testAccCheckIntegrationAwsEksAuditExists(resourceTypeAndName), + resource.TestCheckResourceAttr(resourceTypeAndName, "enabled", "true"), + ), + }, + { + Config: testAccIntegrationAwsEksAuditConfig( + false, + ), + Check: resource.ComposeTestCheckFunc( + testAccCheckIntegrationAwsEksAuditExists(resourceTypeAndName), + resource.TestCheckResourceAttr(resourceTypeAndName, "enabled", "false"), + ), + }, + }, + }) +} + +func testAccCheckIntegrationAwsEksAuditDestroy(s *terraform.State) error { + lacework := testAccProvider.Meta().(*api.Client) + + for _, rs := range s.RootModule().Resources { + if rs.Type != testAccIntegrationAwsEksAuditResourceType { + continue + } + + response, err := lacework.Integrations.GetAws(rs.Primary.ID) + if err != nil { + return err + } + + for _, integration := range response.Data { + if integration.IntgGuid == rs.Primary.ID { + return fmt.Errorf("the AWS integration (%s) still exists", rs.Primary.ID) + } + } + } + + return nil +} + +func testAccCheckIntegrationAwsEksAuditExists(resourceTypeAndName string) resource.TestCheckFunc { + return func(s *terraform.State) error { + lacework := testAccProvider.Meta().(*api.Client) + + rs, ok := s.RootModule().Resources[resourceTypeAndName] + if !ok { + return fmt.Errorf("resource (%s) not found", resourceTypeAndName) + } + + if rs.Primary.ID == "" { + return fmt.Errorf("resource (%s) ID not set", resourceTypeAndName) + } + + response, err := lacework.Integrations.GetAws(rs.Primary.ID) + if err != nil { + return err + } + + if len(response.Data) < 1 { + return fmt.Errorf("the AWS integration (%s) doesn't exist", rs.Primary.ID) + } + + for _, integration := range response.Data { + if integration.IntgGuid == rs.Primary.ID { + return nil + } + } + + return fmt.Errorf("the AWS integration (%s) doesn't exist", rs.Primary.ID) + } +} + +func testAccIntegrationAwsEksAuditEnvVarsPreCheck(t *testing.T) { + if v := os.Getenv(testAccIntegrationAwsEnvSnsArn); v == "" { + t.Fatalf("%s must be set for acceptance tests", testAccIntegrationAwsEnvSnsArn) + } + if v := os.Getenv(testAccIntegrationAwsEnvRoleArn); v == "" { + t.Fatalf("%s must be set for acceptance tests", testAccIntegrationAwsEnvRoleArn) + } + if v := os.Getenv(testAccIntegrationAwsEnvExternalId); v == "" { + t.Fatalf("%s must be set for acceptance tests", testAccIntegrationAwsEnvExternalId) + } +} + +func testAccIntegrationAwsEksAuditConfig(enabled bool) string { + return fmt.Sprintf(` +resource "%s" "%s" { + name = "integration test" + enabled = %t + queue_url = %s + credentials { + role_arn = "%s" + external_id = "%s" + } +} +`, + testAccIntegrationAwsEksAuditResourceType, + testAccIntegrationAwsEksAuditResourceName, + enabled, + os.Getenv(testAccIntegrationAwsEnvSnsArn), + os.Getenv(testAccIntegrationAwsEnvRoleArn), + os.Getenv(testAccIntegrationAwsEnvExternalId), + ) +} diff --git a/website/docs/r/alert_channel_aws_cloudwatch.html.markdown b/website/docs/r/alert_channel_aws_cloudwatch.html.markdown index 16285ea1..123e99ac 100644 --- a/website/docs/r/alert_channel_aws_cloudwatch.html.markdown +++ b/website/docs/r/alert_channel_aws_cloudwatch.html.markdown @@ -41,7 +41,7 @@ A Lacework Amazon CloudWatch Alert Channel integration can be imported using a ` ``` $ terraform import lacework_alert_channel_aws_cloudwatch.all_events EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_aws_s3.html.markdown b/website/docs/r/alert_channel_aws_s3.html.markdown index 84645435..423387c1 100644 --- a/website/docs/r/alert_channel_aws_s3.html.markdown +++ b/website/docs/r/alert_channel_aws_s3.html.markdown @@ -58,6 +58,6 @@ A Lacework Amazon S3 Alert Channel integration can be imported using a `INT_GUID ``` $ terraform import lacework_alert_channel_aws_s3.data_export EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_cisco_webex.html.markdown b/website/docs/r/alert_channel_cisco_webex.html.markdown index 545b2864..1c84b67e 100644 --- a/website/docs/r/alert_channel_cisco_webex.html.markdown +++ b/website/docs/r/alert_channel_cisco_webex.html.markdown @@ -36,6 +36,6 @@ A Lacework Cisco Webex Alert Channel integration can be imported using a `INT_GU ``` $ terraform import lacework_alert_channel_cisco_webex.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_datadog.html.markdown b/website/docs/r/alert_channel_datadog.html.markdown index 7a19d0ec..78969c9b 100644 --- a/website/docs/r/alert_channel_datadog.html.markdown +++ b/website/docs/r/alert_channel_datadog.html.markdown @@ -40,6 +40,6 @@ A Lacework Datadog Alert Channel integration can be imported using a `INT_GUID`, ``` $ terraform import lacework_alert_channel_datadog.ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_email.html.markdown b/website/docs/r/alert_channel_email.html.markdown index 0a9371f9..0d03ab92 100644 --- a/website/docs/r/alert_channel_email.html.markdown +++ b/website/docs/r/alert_channel_email.html.markdown @@ -41,6 +41,6 @@ A Lacework Email Alert Channel integration can be imported using a `INT_GUID`, e ``` $ terraform import lacework_alert_channel_email.auditors EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_gcp_pub_sub.html.markdown b/website/docs/r/alert_channel_gcp_pub_sub.html.markdown index fa9d5f25..7d16976e 100644 --- a/website/docs/r/alert_channel_gcp_pub_sub.html.markdown +++ b/website/docs/r/alert_channel_gcp_pub_sub.html.markdown @@ -55,6 +55,6 @@ A Lacework GCP Pub Sub Alert Channel integration can be imported using a `INT_GU ``` $ terraform import lacework_alert_channel_gcp_pub_sub.data_export EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_jira_cloud.html.markdown b/website/docs/r/alert_channel_jira_cloud.html.markdown index ab70b0e9..a4871d9a 100644 --- a/website/docs/r/alert_channel_jira_cloud.html.markdown +++ b/website/docs/r/alert_channel_jira_cloud.html.markdown @@ -55,7 +55,7 @@ A Lacework Jira Cloud Alert Channel integration can be imported using a `INT_GUI ``` $ terraform import lacework_alert_channel_jira_cloud.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_jira_server.html.markdown b/website/docs/r/alert_channel_jira_server.html.markdown index 0c8fd172..6e50d5ab 100644 --- a/website/docs/r/alert_channel_jira_server.html.markdown +++ b/website/docs/r/alert_channel_jira_server.html.markdown @@ -56,7 +56,7 @@ A Lacework Jira Server Alert Channel integration can be imported using a `INT_GU ``` $ terraform import lacework_alert_channel_jira_server.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_microsoft_teams.html.markdown b/website/docs/r/alert_channel_microsoft_teams.html.markdown index 1857e864..b502ceb5 100644 --- a/website/docs/r/alert_channel_microsoft_teams.html.markdown +++ b/website/docs/r/alert_channel_microsoft_teams.html.markdown @@ -37,6 +37,6 @@ A Lacework Webhook Alert Channel integration can be imported using a `INT_GUID`, ``` $ terraform import lacework_alert_channel_microsoft_teams.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_newrelic.html.markdown b/website/docs/r/alert_channel_newrelic.html.markdown index d251fdff..7aaa93ca 100644 --- a/website/docs/r/alert_channel_newrelic.html.markdown +++ b/website/docs/r/alert_channel_newrelic.html.markdown @@ -38,6 +38,6 @@ A Lacework New Relic Insights Alert Channel integration can be imported using a ``` $ terraform import lacework_alert_channel_newrelic.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_pagerduty.html.markdown b/website/docs/r/alert_channel_pagerduty.html.markdown index 3fb055e8..124627d7 100644 --- a/website/docs/r/alert_channel_pagerduty.html.markdown +++ b/website/docs/r/alert_channel_pagerduty.html.markdown @@ -47,7 +47,7 @@ A Lacework PagerDuty Alert Channel integration can be imported using a `INT_GUID ``` $ terraform import lacework_alert_channel_pagerduty.critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_qradar.html.markdown b/website/docs/r/alert_channel_qradar.html.markdown index 232b6147..840812de 100644 --- a/website/docs/r/alert_channel_qradar.html.markdown +++ b/website/docs/r/alert_channel_qradar.html.markdown @@ -40,6 +40,6 @@ A Lacework IBM QRadar Alert Channel integration can be imported using a `INT_GUI ``` $ terraform import lacework_alert_channel_qradar.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_service_now.html.markdown b/website/docs/r/alert_channel_service_now.html.markdown index 3543aa6f..b61f87a5 100644 --- a/website/docs/r/alert_channel_service_now.html.markdown +++ b/website/docs/r/alert_channel_service_now.html.markdown @@ -42,6 +42,6 @@ A Lacework Service Now Alert Channel integration can be imported using a `INT_GU ``` $ terraform import lacework_alert_channel_service_now.ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_slack.html.markdown b/website/docs/r/alert_channel_slack.html.markdown index 2b0705d0..3de395f5 100644 --- a/website/docs/r/alert_channel_slack.html.markdown +++ b/website/docs/r/alert_channel_slack.html.markdown @@ -36,6 +36,6 @@ A Lacework Slack Alert Channel integration can be imported using a `INT_GUID`, e ``` $ terraform import lacework_alert_channel_slack.ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_splunk.html.markdown b/website/docs/r/alert_channel_splunk.html.markdown index c294163b..06a365eb 100644 --- a/website/docs/r/alert_channel_splunk.html.markdown +++ b/website/docs/r/alert_channel_splunk.html.markdown @@ -53,6 +53,6 @@ A Lacework Splunk Alert Channel integration can be imported using a `INT_GUID`, ``` $ terraform import lacework_alert_channel_splunk.ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_victorops.html.markdown b/website/docs/r/alert_channel_victorops.html.markdown index 7e1c4d9e..ec9a2553 100644 --- a/website/docs/r/alert_channel_victorops.html.markdown +++ b/website/docs/r/alert_channel_victorops.html.markdown @@ -36,6 +36,6 @@ A Lacework VictorOps Alert Channel integration can be imported using a `INT_GUID ``` $ terraform import lacework_alert_channel_victorops.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/alert_channel_webhook.html.markdown b/website/docs/r/alert_channel_webhook.html.markdown index d741dbb5..a9e71a55 100644 --- a/website/docs/r/alert_channel_webhook.html.markdown +++ b/website/docs/r/alert_channel_webhook.html.markdown @@ -38,6 +38,6 @@ A Lacework Webhook Alert Channel integration can be imported using a `INT_GUID`, ``` $ terraform import lacework_alert_channel_webhook.ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_aws_cfg.html.markdown b/website/docs/r/integration_aws_cfg.html.markdown index 4a786341..e4318dac 100644 --- a/website/docs/r/integration_aws_cfg.html.markdown +++ b/website/docs/r/integration_aws_cfg.html.markdown @@ -45,6 +45,6 @@ A Lacework AWS Config integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_aws_cfg.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_aws_ct.html.markdown b/website/docs/r/integration_aws_ct.html.markdown index 05a7918b..4ccba954 100644 --- a/website/docs/r/integration_aws_ct.html.markdown +++ b/website/docs/r/integration_aws_ct.html.markdown @@ -166,11 +166,11 @@ The `mapping` block supports: ## Import -A Lacework AWS Config integration can be imported using a `INT_GUID`, e.g. +A Lacework AWS CloudTrail integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_aws_ct.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_aws_eks_audit_log.html.markdown b/website/docs/r/integration_aws_eks_audit_log.html.markdown new file mode 100644 index 00000000..7e820e53 --- /dev/null +++ b/website/docs/r/integration_aws_eks_audit_log.html.markdown @@ -0,0 +1,52 @@ +--- +subcategory: "Cloud Account Integrations" +layout: "lacework" +page_title: "Lacework: lacework_cloud_account_aws_eks_audit_log" +description: |- + Create and manage AWS EKS Audit Log integrations +--- + +# lacework\_cloud\_account\_aws\_eks\_audit\_log + +Use this resource to configure an [AWS EKS Audit Log integration](https://docs.lacework.com/category/eks-audit-log-integrations) to analyze EKS audit logs. + +## Example Usage + +```hcl +resource "lacework_cloud_account_aws_eks_audit_log" "account_abc" { + name = "account ABC" + sns_arn = "arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d" + credentials { + role_arn = "arn:aws:iam::1234567890:role/lacework_iam_example_role" + external_id = "12345" + } +} +``` + +## Argument Reference + +The following arguments are supported: + +* `name` - (Required) The AWS CloudTrail integration name. +* `sns_arn` - (Required) The SNS topic ARN to share with Lacework. +* `credentials` - (Required) The credentials needed by the integration. See [Credentials](#credentials) below for details. +* `enabled` - (Optional) The state of the external integration. Defaults to `true`. +* `retries` - (Optional) The number of attempts to create the cloud account integration. Defaults to `5`. + +### Credentials + +`credentials` supports the following arguments: + +* `role_arn`: (Required) The ARN of the IAM role. +* `external_id`: (Required) The external ID for the IAM role. + +## Import + +A Lacework AWS EKS Audit Log integration can be imported using a `INT_GUID`, e.g. + +``` +$ terraform import lacework_integration_aws_eks_audit_log.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 +``` +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the + Lacework CLI command `lacework integration list`. To install this tool follow + [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_aws_govcloud_cfg.html.markdown b/website/docs/r/integration_aws_govcloud_cfg.html.markdown index 090e5888..17ee61ec 100644 --- a/website/docs/r/integration_aws_govcloud_cfg.html.markdown +++ b/website/docs/r/integration_aws_govcloud_cfg.html.markdown @@ -49,6 +49,6 @@ A Lacework AWS Config integration for AWS GovCloud can be imported using a `INT_ ``` $ terraform import lacework_integration_aws_govcloud_cfg.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_aws_govcloud_ct.html.markdown b/website/docs/r/integration_aws_govcloud_ct.html.markdown index 9b4970fa..e3c232b5 100644 --- a/website/docs/r/integration_aws_govcloud_ct.html.markdown +++ b/website/docs/r/integration_aws_govcloud_ct.html.markdown @@ -50,6 +50,6 @@ A Lacework AWS CloudTrail integration for AWS GovCloud can be imported using a ` ``` $ terraform import lacework_integration_aws_govcloud_ct.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_azure_al.html.markdown b/website/docs/r/integration_azure_al.html.markdown index 811ade6d..6b7a6ede 100644 --- a/website/docs/r/integration_azure_al.html.markdown +++ b/website/docs/r/integration_azure_al.html.markdown @@ -50,6 +50,6 @@ A Lacework Azure Activity Log integration can be imported using a `INT_GUID`, e. ``` $ terraform import lacework_integration_azure_at.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_azure_cfg.html.markdown b/website/docs/r/integration_azure_cfg.html.markdown index 7515dd16..c1eaebc7 100644 --- a/website/docs/r/integration_azure_cfg.html.markdown +++ b/website/docs/r/integration_azure_cfg.html.markdown @@ -47,6 +47,6 @@ A Lacework Azure Config integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_azure_cfg.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli). diff --git a/website/docs/r/integration_docker_hub.html.markdown b/website/docs/r/integration_docker_hub.html.markdown index fd222f97..0ff61e68 100644 --- a/website/docs/r/integration_docker_hub.html.markdown +++ b/website/docs/r/integration_docker_hub.html.markdown @@ -46,6 +46,6 @@ A Lacework Docker Hub container registry integration can be imported using a `IN ``` $ terraform import lacework_integration_docker_hub.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_docker_v2.html.markdown b/website/docs/r/integration_docker_v2.html.markdown index fde4c528..01c4e388 100644 --- a/website/docs/r/integration_docker_v2.html.markdown +++ b/website/docs/r/integration_docker_v2.html.markdown @@ -63,6 +63,6 @@ A Lacework Docker V2 container registry integration can be imported using a `INT ``` $ terraform import lacework_integration_docker_v2.jfrog EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_ecr.html.markdown b/website/docs/r/integration_ecr.html.markdown index a4ff8237..16abe404 100644 --- a/website/docs/r/integration_ecr.html.markdown +++ b/website/docs/r/integration_ecr.html.markdown @@ -107,7 +107,7 @@ A Lacework ECR integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_ecr.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_gar.html.markdown b/website/docs/r/integration_gar.html.markdown index 34033fc3..6d06d2e6 100644 --- a/website/docs/r/integration_gar.html.markdown +++ b/website/docs/r/integration_gar.html.markdown @@ -166,7 +166,7 @@ A Lacework GAR integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_gar.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_gcp_at.html.markdown b/website/docs/r/integration_gcp_at.html.markdown index cfd81235..63969e09 100644 --- a/website/docs/r/integration_gcp_at.html.markdown +++ b/website/docs/r/integration_gcp_at.html.markdown @@ -71,6 +71,6 @@ A Lacework GCP Audit Trail integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_gcp_at.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_gcp_cfg.html.markdown b/website/docs/r/integration_gcp_cfg.html.markdown index 77511c73..f20496e3 100644 --- a/website/docs/r/integration_gcp_cfg.html.markdown +++ b/website/docs/r/integration_gcp_cfg.html.markdown @@ -68,6 +68,6 @@ A Lacework GCP Config integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_gcp_cfg.account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_gcr.html.markdown b/website/docs/r/integration_gcr.html.markdown index 44400279..329efc26 100644 --- a/website/docs/r/integration_gcr.html.markdown +++ b/website/docs/r/integration_gcr.html.markdown @@ -102,6 +102,6 @@ A Lacework GCR integration can be imported using a `INT_GUID`, e.g. ``` $ terraform import lacework_integration_gcr.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/integration_ghcr.html.markdown b/website/docs/r/integration_ghcr.html.markdown index 98895af2..4d936846 100644 --- a/website/docs/r/integration_ghcr.html.markdown +++ b/website/docs/r/integration_ghcr.html.markdown @@ -50,6 +50,6 @@ A Lacework Github container registry integration can be imported using a `INT_GU ``` $ terraform import lacework_integration_ghcr.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `INT_GUID` from existing integrations in your account, use the +-> **Note:** To retrieve the `INT_GUID` from existing integrations in your account, use the Lacework CLI command `lacework integration list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/policy.html.markdown b/website/docs/r/policy.html.markdown index b9ca25f6..7d5cd8d8 100644 --- a/website/docs/r/policy.html.markdown +++ b/website/docs/r/policy.html.markdown @@ -98,6 +98,6 @@ A Lacework policy can be imported using a `POLICY_ID`, e.g. $ terraform import lacework_policy.example YourLQLPolicyID ``` --> **Note:** To retreive the `POLICY_ID` from existing policies in your account, use the +-> **Note:** To retrieve the `POLICY_ID` from existing policies in your account, use the Lacework CLI command `lacework policy list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/query.html.markdown b/website/docs/r/query.html.markdown index 9ec109fe..c6bc6bba 100644 --- a/website/docs/r/query.html.markdown +++ b/website/docs/r/query.html.markdown @@ -88,6 +88,6 @@ A Lacework query can be imported using a `QUERY_ID`, e.g. $ terraform import lacework_query.example YourLQLQueryID ``` --> **Note:** To retreive the `QUERY_ID` from existing queries in your account, use the +-> **Note:** To retrieve the `QUERY_ID` from existing queries in your account, use the Lacework CLI command `lacework query list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_account.html.markdown b/website/docs/r/resource_group_account.html.markdown index 72cb6701..0524c307 100644 --- a/website/docs/r/resource_group_account.html.markdown +++ b/website/docs/r/resource_group_account.html.markdown @@ -47,6 +47,6 @@ A Lacework Account Resource Group can be imported using a `RESOURCE_GUID`, e.g. ``` $ terraform import lacework_resource_group_account.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_aws.html.markdown b/website/docs/r/resource_group_aws.html.markdown index c3e8fc7b..91c1530e 100644 --- a/website/docs/r/resource_group_aws.html.markdown +++ b/website/docs/r/resource_group_aws.html.markdown @@ -37,6 +37,6 @@ A Lacework AWS Resource Group can be imported using a `RESOURCE_GUID`, e.g. ``` $ terraform import lacework_resource_group_aws.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_azure.html.markdown b/website/docs/r/resource_group_azure.html.markdown index a55b92ff..2649ec31 100644 --- a/website/docs/r/resource_group_azure.html.markdown +++ b/website/docs/r/resource_group_azure.html.markdown @@ -39,6 +39,6 @@ A Lacework Azure Resource Group can be imported using a `RESOURCE_GUID`, e.g. ``` $ terraform import lacework_resource_group_azure.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_container.html.markdown b/website/docs/r/resource_group_container.html.markdown index 7c327cdd..5e55d0ad 100644 --- a/website/docs/r/resource_group_container.html.markdown +++ b/website/docs/r/resource_group_container.html.markdown @@ -42,6 +42,6 @@ A Lacework Container Resource Group can be imported using a `RESOURCE_GUID`, e.g ``` $ terraform import lacework_resource_group_container.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_gcp.html.markdown b/website/docs/r/resource_group_gcp.html.markdown index c4fc606e..6786716f 100644 --- a/website/docs/r/resource_group_gcp.html.markdown +++ b/website/docs/r/resource_group_gcp.html.markdown @@ -39,6 +39,6 @@ A Lacework GCP Resource Group can be imported using a `RESOURCE_GUID`, e.g. ``` $ terraform import lacework_resource_group_gcp.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/resource_group_machine.html.markdown b/website/docs/r/resource_group_machine.html.markdown index 1c87259f..9029cf25 100644 --- a/website/docs/r/resource_group_machine.html.markdown +++ b/website/docs/r/resource_group_machine.html.markdown @@ -40,6 +40,6 @@ A Lacework Machine Resource Group can be imported using a `RESOURCE_GUID`, e.g. ``` $ terraform import lacework_resource_group_machine.example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5 ``` --> **Note:** To retreive the `RESOURCE_GUID` from existing resource groups in your account, use the +-> **Note:** To retrieve the `RESOURCE_GUID` from existing resource groups in your account, use the Lacework CLI command `lacework resource-group list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/docs/r/team_member.html.markdown b/website/docs/r/team_member.html.markdown index 15045efe..849ba8c6 100644 --- a/website/docs/r/team_member.html.markdown +++ b/website/docs/r/team_member.html.markdown @@ -139,6 +139,6 @@ A Lacework organization-level team member can be imported using the `email`, e.g $ terraform import lacework_team_member.albus albus@hogwarts.io ``` --> **Note:** To retreive the `USER_GUID` or `EMAIL` from existing team members in your account, +-> **Note:** To retrieve the `USER_GUID` or `EMAIL` from existing team members in your account, use the Lacework CLI command `lacework team-member list`. To install this tool follow [this documentation](https://docs.lacework.com/cli/). diff --git a/website/lacework.erb b/website/lacework.erb index 5142b156..7213a037 100644 --- a/website/lacework.erb +++ b/website/lacework.erb @@ -113,6 +113,9 @@
  • lacework_integration_aws_ct
  • +
  • + lacework_integration_aws_eks_audit_log +
  • lacework_integration_aws_govcloud_cfg