Skip to content

Commit

Permalink
add guardduty for every region
Browse files Browse the repository at this point in the history
  • Loading branch information
anmolnagpal committed Jan 26, 2022
1 parent b59652e commit 5412fa1
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions modules/guardduty/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ module "labels" {
}

resource "aws_s3_bucket" "bucket" {
count = var.enabled && var.only_guardduty_enable ? 1 : 0
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
bucket = var.bucket_name
acl = "private"
force_destroy = true
Expand Down Expand Up @@ -46,7 +46,7 @@ resource "aws_guardduty_invite_accepter" "member_accepter" {
}

resource "aws_s3_bucket_object" "ipset" {
count = var.enabled && var.only_guardduty_enable ? 1 : 0
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
acl = "private"
content = templatefile("${path.module}/templates/ipset.txt.tpl",
{ ipset_iplist = var.ipset_iplist })
Expand All @@ -66,7 +66,7 @@ resource "aws_guardduty_ipset" "ipset" {
}

resource "aws_s3_bucket_object" "threatintelset" {
count = var.enabled && var.only_guardduty_enable ? 1 : 0
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
acl = "private"
content = templatefile("${path.module}/templates/threatintelset.txt.tpl",
{ threatintelset_iplist = var.threatintelset_iplist })
Expand Down Expand Up @@ -98,7 +98,7 @@ resource "aws_guardduty_member" "member" {
#Module : CLOUD WATCH EVENT RULE
#Description : Event rule for cloud watch events.
resource "aws_cloudwatch_event_rule" "default" {
count = var.enabled && var.only_guardduty_enable ? 1 : 0
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
name = format("%s-er", module.labels.id)
description = "Event rule for AWS Guarddduty."
role_arn = var.rule_iam_role_arn
Expand All @@ -120,7 +120,7 @@ resource "aws_cloudwatch_event_rule" "default" {
#Module : CLOUD WATCH EVENT TARGET
#Description : Attaching event rule and lambda function to targets.
resource "aws_cloudwatch_event_target" "default" {
count = var.enabled && var.only_guardduty_enable ? 1 : 0
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
rule = join("", aws_cloudwatch_event_rule.default.*.name)
target_id = "Guardduty"
arn = module.slack-lambda.arn # ARN of the Lambda Function, write after including lambda function
Expand All @@ -136,7 +136,7 @@ module "slack-lambda" {
environment = var.environment
label_order = ["name"]
managedby = var.managedby
enabled = var.enabled && var.only_guardduty_enable
enabled = var.enabled && var.only_guardduty_enable == false

filename = format("%s/slack", path.module)
handler = "index.handler"
Expand Down

0 comments on commit 5412fa1

Please sign in to comment.