@@ -40,8 +40,6 @@ locals {
40
40
account_id_hash = substr (md5 (data. aws_caller_identity . current . account_id ), 0 , 4 )
41
41
role_name = " ${ var . name } -${ random_id . suffix . hex } -${ local . account_id_hash } "
42
42
bucket_arn = regex (" ^([^/]+)" , var. folder_arn )[0 ]
43
- bucket_name = var. is_gov_cloud_onboarding ? replace (local. bucket_arn , " arn:aws-us-gov:s3:::" , " " ) : replace (local. bucket_arn , " arn:aws:s3:::" , " " )
44
- bucket_region = data. aws_s3_bucket . cloudtrail_bucket . region
45
43
trusted_identity = var. is_gov_cloud_onboarding ? data. sysdig_secure_trusted_cloud_identity . trusted_identity . gov_identity : data. sysdig_secure_trusted_cloud_identity . trusted_identity . identity
46
44
47
45
topic_name = split (" :" , var. topic_arn )[5 ]
@@ -107,11 +105,21 @@ data "aws_iam_policy_document" "cloudlogs_s3_access" {
107
105
" ${ local . bucket_arn } /*"
108
106
]
109
107
}
110
- }
111
108
112
- # Fetch the S3 bucket information
113
- data "aws_s3_bucket" "cloudtrail_bucket" {
114
- bucket = local. bucket_name
109
+ statement {
110
+ sid = " CloudlogsS3AccessList"
111
+
112
+ effect = " Allow"
113
+
114
+ actions = [
115
+ " s3:List*"
116
+ ]
117
+
118
+ resources = [
119
+ local . bucket_arn ,
120
+ " ${ local . bucket_arn } /*"
121
+ ]
122
+ }
115
123
}
116
124
117
125
# -----------------------------------------------------------------------------------------------------------------------
@@ -163,8 +171,6 @@ resource "sysdig_secure_cloud_auth_account_component" "aws_cloud_logs" {
163
171
cloudtrailSns = {
164
172
role_name = local.role_name
165
173
topic_arn = var.topic_arn
166
- subscription_arn = aws_sns_topic_subscription.cloudtrail_notifications.arn
167
- bucket_region = local.bucket_region
168
174
bucket_arn = local.bucket_arn
169
175
ingested_regions = var.regions
170
176
routing_key = local.routing_key
0 commit comments