From 8b61e0d08fb78b0111117615ed1d61f9ead3ed0a Mon Sep 17 00:00:00 2001 From: bruzzechesse Date: Tue, 19 Nov 2024 14:21:01 +0100 Subject: [PATCH] README.md --- blueprints/secops/README.md | 7 +++++++ blueprints/secops/bindplane-gke/README.md | 8 ++++---- 2 files changed, 11 insertions(+), 4 deletions(-) diff --git a/blueprints/secops/README.md b/blueprints/secops/README.md index 0d42455f68..04082de5d8 100644 --- a/blueprints/secops/README.md +++ b/blueprints/secops/README.md @@ -2,6 +2,13 @@ This repository provides a collection of Terraform blueprints designed to automate the implementation of custom integrations, agents and configurations for Google Cloud Security and Operations SecOps (aka Chronicle). +## BindPlane OP Management on GKE + + This [blueprint](./bindplane-gke/) is a modular and scalable solution for deployment of the BindPlane OP Management Console within a Google Kubernetes Engine (GKE) environment. + +
+ + ## SecOps GKE Forwarder This [blueprint](./secops-gke-forwarder/) is a modular and scalable solution for setting up a SecOps forwarder on Google Kubernetes Engine (GKE). This forwarder is designed to handle multi-tenant data ingestion, ensuring secure and efficient log forwarding to your SecOps SIEM instances. diff --git a/blueprints/secops/bindplane-gke/README.md b/blueprints/secops/bindplane-gke/README.md index 4e229718c7..fbd17ff98e 100644 --- a/blueprints/secops/bindplane-gke/README.md +++ b/blueprints/secops/bindplane-gke/README.md @@ -59,16 +59,16 @@ Setup terraform providers in the root module to deal with kubernetes resources a ```terraform data "google_client_config" "identity" { - count = module.chronicle-forwarder.fleet_host != null ? 1 : 0 + count = module.bindplane-gke.fleet_host != null ? 1 : 0 } provider "kubernetes" { - host = module.chronicle-forwarder.fleet_host + host = module.bindplane-gke.fleet_host token = try(data.google_client_config.identity.0.access_token, null) } provider "kubectl" { - host = module.chronicle-forwarder.fleet_host + host = module.bindplane-gke.fleet_host token = try(data.google_client_config.identity.0.access_token, null) } ``` @@ -130,7 +130,7 @@ Access the management console leveraging credentials bootstrapped via terraform ```hcl module "bindplane-gke" { source = "./fabric/blueprints/secops/bindplane-gke" - project_id = "bindplane" + project_id = "test" bindplane_secrets = { user = "admin" password = "thisisnotasecret"