Skip to content

Commit 5412fa1

Browse files
committed
add guardduty for every region
1 parent b59652e commit 5412fa1

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/guardduty/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "labels" {
1616
}
1717

1818
resource "aws_s3_bucket" "bucket" {
19-
count = var.enabled && var.only_guardduty_enable ? 1 : 0
19+
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
2020
bucket = var.bucket_name
2121
acl = "private"
2222
force_destroy = true
@@ -46,7 +46,7 @@ resource "aws_guardduty_invite_accepter" "member_accepter" {
4646
}
4747

4848
resource "aws_s3_bucket_object" "ipset" {
49-
count = var.enabled && var.only_guardduty_enable ? 1 : 0
49+
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
5050
acl = "private"
5151
content = templatefile("${path.module}/templates/ipset.txt.tpl",
5252
{ ipset_iplist = var.ipset_iplist })
@@ -66,7 +66,7 @@ resource "aws_guardduty_ipset" "ipset" {
6666
}
6767

6868
resource "aws_s3_bucket_object" "threatintelset" {
69-
count = var.enabled && var.only_guardduty_enable ? 1 : 0
69+
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
7070
acl = "private"
7171
content = templatefile("${path.module}/templates/threatintelset.txt.tpl",
7272
{ threatintelset_iplist = var.threatintelset_iplist })
@@ -98,7 +98,7 @@ resource "aws_guardduty_member" "member" {
9898
#Module : CLOUD WATCH EVENT RULE
9999
#Description : Event rule for cloud watch events.
100100
resource "aws_cloudwatch_event_rule" "default" {
101-
count = var.enabled && var.only_guardduty_enable ? 1 : 0
101+
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
102102
name = format("%s-er", module.labels.id)
103103
description = "Event rule for AWS Guarddduty."
104104
role_arn = var.rule_iam_role_arn
@@ -120,7 +120,7 @@ resource "aws_cloudwatch_event_rule" "default" {
120120
#Module : CLOUD WATCH EVENT TARGET
121121
#Description : Attaching event rule and lambda function to targets.
122122
resource "aws_cloudwatch_event_target" "default" {
123-
count = var.enabled && var.only_guardduty_enable ? 1 : 0
123+
count = var.enabled && var.only_guardduty_enable == false ? 1 : 0
124124
rule = join("", aws_cloudwatch_event_rule.default.*.name)
125125
target_id = "Guardduty"
126126
arn = module.slack-lambda.arn # ARN of the Lambda Function, write after including lambda function
@@ -136,7 +136,7 @@ module "slack-lambda" {
136136
environment = var.environment
137137
label_order = ["name"]
138138
managedby = var.managedby
139-
enabled = var.enabled && var.only_guardduty_enable
139+
enabled = var.enabled && var.only_guardduty_enable == false
140140

141141
filename = format("%s/slack", path.module)
142142
handler = "index.handler"

0 commit comments

Comments
 (0)