Comments (7)
@nozaq we figured out what went wrong with our implementation. we did not include the regions.tf
file to our implementation. once that was in, it worked pretty darn good.
we love your work and we appreciate you for making this module. thank you!
from terraform-aws-secure-baseline.
@nazroll ah, that explains much🤓 feel free to open an issue anytime if you have any comments/feedbacks!
from terraform-aws-secure-baseline.
@nazroll Those errors mean that terraform-aws-secure-baseline
module tried to create new resources (CloudWatch Log Group and GuardDuty Detector) but your account already had conflicting resources.
You can tell Terraform to refer existing resources instead of creating new ones by importing them into your state file.
The exact instruction to import specific resource type can be found in the terraform document.
You need to specify GuardDuty Detector ID when importing it, which can be found at AWS Management Console > GuardDuty > Settings > About GuardDuty
.
Hope it helps, please let me know if you have further questions :)
from terraform-aws-secure-baseline.
@nozaq thanks for your response!
We don't have any resources provisioned related to cloudwatch log groups and guardduty for this account, before we ran terraform apply
.
This what boggled us. it's a completely new AWS account.
from terraform-aws-secure-baseline.
@nazroll Hmm, that's strange 🤔 I'll test with my empty account, let's see if we can reproduce the same errors.
from terraform-aws-secure-baseline.
@nazroll
I've run this example with my empty account, and it succeeded.
One thing I noticed was providers
are missing in your configuration.
Did you pass providers like this?
from terraform-aws-secure-baseline.
@nozaq We did pass in the providers.
module "secure-baseline" {
source = "nozaq/secure-baseline/aws"
version = "0.8.0"
audit_log_bucket_name = "${var.audit_s3_bucket_name}"
aws_account_id = "${data.aws_caller_identity.current.account_id}"
region = "${var.region}"
support_iam_role_principal_arn = "${var.support_iam_role_principal_arn}"
providers = {
"aws" = "aws"
"aws.ap-northeast-1" = "aws.ap-northeast-1"
"aws.ap-northeast-2" = "aws.ap-northeast-2"
"aws.ap-south-1" = "aws.ap-south-1"
"aws.ap-southeast-1" = "aws.ap-southeast-1"
"aws.ap-southeast-2" = "aws.ap-southeast-2"
"aws.ap-southeast-2" = "aws.ap-southeast-2"
"aws.ca-central-1" = "aws.ca-central-1"
"aws.eu-central-1" = "aws.eu-central-1"
"aws.eu-north-1" = "aws.eu-north-1"
"aws.eu-west-1" = "aws.eu-west-1"
"aws.eu-west-2" = "aws.eu-west-2"
"aws.eu-west-3" = "aws.eu-west-3"
"aws.sa-east-1" = "aws.sa-east-1"
"aws.us-east-1" = "aws.us-east-1"
"aws.us-east-2" = "aws.us-east-2"
"aws.us-west-1" = "aws.us-west-1"
"aws.us-west-2" = "aws.us-west-2"
}
}
This is the error message after we ran that plan.
Error: module “secure-baseline”: cannot pass non-existent provider “aws.us-east-1"
Terraform version: 0.11.13
Active AWS region: eu-west-1
from terraform-aws-secure-baseline.
Related Issues (20)
- Policy errors during terraform apply of partially enabled baseline HOT 5
- S3 bucket - Terraform AWS Provider 4.0
- Make Audit Bucket Glacier Lifecycle Configuration Optional HOT 3
- GuardDuty: creation of invite accepter for master account? HOT 1
- data.aws_subnets.default.ids known only after apply HOT 3
- Example links on https://registry.terraform.io/modules/nozaq/secure-baseline/aws/2.0.0 are dead HOT 1
- Log delivery for notification messages sent to a topic
- Make audit log & content bucket name fully customizable
- Support for adding Security Hub member accounts via Organizations instead of the Manual process?
- Upgrade Security Hub CIS to v1.4.0 HOT 1
- Issue creating CloudTrail HOT 2
- Alarm baseline HOT 4
- AWS Control Tower Support
- Enable Object Lock for CloudTrail S3 Buckets
- Versioning and MFA Delete is not available for S3 buckets.
- Enable `NIST Special Publication 800-53 Revision 5`
- "The bucket does not allow ACLs" HOT 1
- Allow CloudTrail encryption with SSE-S3
- Setting '*_key_prefix' variables to empty string results in S3 paths containing pointless duplicit slash "/"
- Allow `aws_s3_bucket_policy` to be optionally applied or take on additional external policies
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from terraform-aws-secure-baseline.