# Discovery bucket name. Should be without 's3://' prefix # and can contain optional folder path## Example 1: DISCOVERY_BUCKET_NAME: "my-discovery-bucket"# Example 2: DISCOVERY_BUCKET_NAME: "my-discovery-bucket/my-path"# This bucket will be created by Privacera Manager using terraform.DISCOVERY_BUCKET_NAME:“<PLEASE_CHANGE>”
# If you do not want Privacera Manager to create the S3bucket, # uncomment the following,# DISCOVERY_CREATE_BUCKET: "false"# If you do not want Privacera Managerto create the DynamoDB tables, uncomment # the following,#DISCOVERY_CREATE_NOSQL_TABLES: "false"# If you have created DynamoDB tables with different names, then uncomment the following,# and set the values to the table names.## NOTE: Privacera Manager will not create tables with these names, you have to create# them manually and set DISCOVERY_CREATE_NOSQL_TABLES: "false"## SCAN_REQUEST_TABLE: "<PLEASE_CHANGE>"# RESOURCE_TABLE: "<PLEASE_CHANGE>"# ALERT_TABLE: "<PLEASE_CHANGE>"# AUDIT_SUMMARY_TABLE: "<PLEASE_CHANGE>"# ACTIVE_SCANS_TABLE: "<PLEASE_CHANGE>"# STATE_TABLE: "<PLEASE_CHANGE>"# If you do not want Privacera Manager to create the SQS queue, uncomment # the following#DISCOVERY_CREATE_SQS: "false"# If you want to use a different name for the SQS queue, uncomment the following# DISCOVERY_BUCKET_SQS_NAME: "<PLEASE_CHANGE>"# IAM Role for Service Account used by Discovery Driver and Executor PodsDISCOVERY_USE_POD_IAM_ROLE:"true"DISCOVERY_IAM_ROLE_ARN:"<PLEASE_CHANGE>"DISCOVERY_CONSUMER_ENABLE:"true"DISCOVERY_CONSUMER_USE_POD_IAM_ROLE:"true"DISCOVERY_CONSUMER_IAM_ROLE_ARN:"<PLEASE_CHANGE>"PORTAL_USE_POD_IAM_ROLE:"true"PORTAL_IAM_ROLE_ARN:"<PLEASE_CHANGE>"DISCOVERY_K8S_SPARK_DYNAMIC_ALLOCATION_ENABLED:"true"
Run the following commands on the Privacera Manager host to enable real-time discovery features for Self Managed and PrivaceraCloud Data Plane deployments.
Copy the vars.pkafka.aws.yml from config/sample-vars to config/custom-vars and edit the file.
The Ranger TagSync username and password are used to push the tags to Ranger. These are the credentials of the ranger admin user created as per Create Ranger Service user for Discovery Compliance policies The same steps have to be followed in the Self Managed deployment using Privacera Portal in the VPC and for PrivaceraCloud Data Plane deployment using the PrivaceraCloud Portal.