You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _data/library.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -413,7 +413,7 @@
413
413
description: An AWS Lambda function that can automatically share an RDS snapshot with another AWS account. Useful for storing your RDS backups in a separate backup account.
414
414
- name: lambda-copy-shared-snapshot
415
415
blurb: copy RDS snapshots
416
-
description: An AWS Lambda function that can make a local copy of an RDS snapshot shared from another AWS account. Useful for storing yoru RDS backups in a separate backup account.
416
+
description: An AWS Lambda function that can make a local copy of an RDS snapshot shared from another AWS account. Useful for storing your RDS backups in a separate backup account.
417
417
- name: lambda-cleanup-snapshots
418
418
blurb: delete RDS snapshots
419
419
description: An AWS Lambda function that runs on a scheduled basis to clean up old RDS database snapshots. Useful to ensure you aren't spending lots of money storing old snapshots you no longer need.
Copy file name to clipboardExpand all lines: _data/privacy-policy.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -206,10 +206,10 @@
206
206
<li>Inferences, including information about your interests and preferences. </li>
207
207
<li>Internet activity, including your interactions with the Services and what led you to Gruntwork. </li>
208
208
</ul>
209
-
<p><u>The Purposes for Our Collection:</u> We collect and use these categories of personal data for our business and commercial purposes described in the “How do we use your information” section above, including providing and improving the Services, maintaining the safety and security of the Services, and for advertising and marketing our business.</p>
209
+
<p><u>The Purposes for Our Collection:</u> We collect and use these categories of personal data for our business and commercial purposes described in the “How do we use your information” section above, including providing and improving the Services, maintaining the safety and security of the Services, and for advertising and marketing our business.</p>
210
210
<p><u>Third-Party Marketing and Your Rights (Opt-Out of “Sale”):</u> Gruntwork does not sell personal data to third parties for monetary value. However, the term “sale” is defined broadly in the CCPA. To the extent that “sale” under the CCPA is interpreted to include interest-based advertising or other data uses described in the “How do we use your information” section above, we will comply with applicable law with respect to those uses.</p>
211
211
<p><u>“Do Not Track” Signals:</u> We do not recognize or respond to any web browser-initiated “Do Not Track” signals. At present, no universally accepted standard exists on how companies should respond to “Do Not Track” signals. In the event a universally accepted standard is established, we will assess and provide an appropriate response to these signals. If you wish, you can configure most browsers to reject cookies or to notify you when you are sent a cookie, giving you a chance to decide whether or not to accept it. Consult the help section of your browser to learn more about how to do this. Please note that if you choose to remove or reject cookies, this could affect the availability and functionality of the Services. </p>
212
-
<p><u>Shine The Light:</u> California Civil Code §1798.83 permits users of the Website who are California residents to request certain information regarding our disclosure of personal data to third parties for their direct marketing purposes. Gruntwork does not share personal data with third parties for their direct marketing purposes.</p>
212
+
<p><u>Shine The Light:</u> California Civil Code §1798.83 permits users of the Website who are California residents to request certain information regarding our disclosure of personal data to third parties for their direct marketing purposes. Gruntwork does not share personal data with third parties for their direct marketing purposes.</p>
Copy file name to clipboardExpand all lines: _data/terms-of-service.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@
16
16
items:
17
17
- title: 1. Updates to these Terms
18
18
legalese: |
19
-
<p><strong>1.1. Revisions.</strong> We may revise these Terms or any additional terms and conditions which are relevant to a particular Service from time-to-time. We will post the revised terms to our website (currently <a rel="internal" rel="internal" href="/terms/" title="Grountwork Terms of Service">https://gruntwork.io/terms</a>) (the “Website”) with a “last updated” date, and we will attempt to notify you of any material updates to these Terms via email or through the Services. IF YOU CONTINUE TO USE THE SERVICES AFTER THE REVISIONS TAKE EFFECT, YOU AGREE TO BE BOUND BY THE REVISED TERMS. You agree that we shall not be liable to you or to any third party for any modification of the Terms.</p>
19
+
<p><strong>1.1. Revisions.</strong> We may revise these Terms or any additional terms and conditions which are relevant to a particular Service from time-to-time. We will post the revised terms to our website (currently <a rel="internal" rel="internal" href="/terms/" title="Gruntwork Terms of Service">https://gruntwork.io/terms</a>) (the “Website”) with a “last updated” date, and we will attempt to notify you of any material updates to these Terms via email or through the Services. IF YOU CONTINUE TO USE THE SERVICES AFTER THE REVISIONS TAKE EFFECT, YOU AGREE TO BE BOUND BY THE REVISED TERMS. You agree that we shall not be liable to you or to any third party for any modification of the Terms.</p>
20
20
<p><strong>1.2. Notifying You of Updates.</strong> You agree to receive electronically all communications, agreements, and notices that we provide in connection with any Services (“Communications”), including by email, by posting them to our website, or through any Services. You agree that all Communications that we provide to you electronically satisfy any legal requirement that such Communications be in writing and you agree to keep your Account contact information current.</p>
21
21
plain: |
22
22
We might update these Terms of Service at some point, and if we do, we'll proactively notify you about it.
Copy file name to clipboardExpand all lines: _posts/2019-08-12-how-to-configure-production-grade-aws-account-structure.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -683,7 +683,7 @@ and automated users in your child accounts. The exact set of IAM roles you need
683
683
requirements, but here are some common ones:
684
684
685
685
allow-auto-deploy-access-from-other-accounts::
686
-
This is an IAM role that grants permissions for automatically deploying (e.g., as part of a CI / CD pipline)
686
+
This is an IAM role that grants permissions for automatically deploying (e.g., as part of a CI / CD pipeline)
687
687
some specific service. For example, this role may have a trust policy that allows it to be assumed by a Jenkins
688
688
server in the shared-services account, and gives that server permissions to deploy EC2 Instances and Auto Scaling
689
689
Groups. Note that anyone who has to your CI server (e.g., anyone who can create/modify/execute Jenkins jobs) can
@@ -886,7 +886,7 @@ the central place where you manage billing. You create this initial account manu
886
886
=== Apply the security baseline to the root account
887
887
888
888
Next, we'll apply a security baseline to the root account that is responsible for configuring AWS Organizations, IAM Roles, IAM Users,
889
-
IAM Groups, IAM Password Policies, Amazon GuardyDuty, AWS CloudTrail and AWS Config including setting up the child accounts.
889
+
IAM Groups, IAM Password Policies, Amazon GuardDuty, AWS CloudTrail and AWS Config including setting up the child accounts.
890
890
891
891
Let's first apply the security baseline by using the `account-baseline-root` module from https://github.com/gruntwork-io/module-security[module-security].
892
892
@@ -1000,7 +1000,7 @@ variable "child_accounts" {
1000
1000
# Defaults to the Organization default Root ID.
1001
1001
#
1002
1002
# - role_name:
1003
-
# The name of an IAM role that Organizations automatically preconfigures in the new member account. This role trusts
1003
+
# The name of an IAM role that Organizations automatically pre-configures in the new member account. This role trusts
1004
1004
# the master account, allowing users in the master account to assume the role, as permitted by the master account
1005
1005
# administrator. The role has administrator permissions in the new member account. Note that the Organizations API
1006
1006
# provides no method for reading this information after account creation.
| Provision the infrastructure. Includes EC2 instances, load balancers, network topology, security gr oups, IAM permissions, etc.
281
+
| Provision the infrastructure. Includes EC2 instances, load balancers, network topology, security groups, IAM permissions, etc.
282
282
| Terraform, CloudFormation
283
283
284
284
| Deploy
@@ -1049,7 +1049,7 @@ Configure variables::
1049
1049
This is similar to the `testing/terraform.tfvars` used in manual testing.
1050
1050
1051
1051
Configure the backend::
1052
-
This is similar to tthe `testing-backend.hcl` used in manual testing.
1052
+
This is similar to the `testing-backend.hcl` used in manual testing.
1053
1053
1054
1054
Namespace resources::
1055
1055
The code uses `random.UniqueId()` to generate unique identifiers for all the resources in this test. This allows
@@ -1426,7 +1426,7 @@ Use TFC without Terragrunt::
1426
1426
1427
1427
Use TFC with Terragrunt::
1428
1428
Alternatively, you can use both `infrastructure-modules` and `infrastructure-live` repositories as described above,
1429
-
storing the wrapper modules in `infrastructure-modules`, and using `infastructure-live` and Terragrunt for
1429
+
storing the wrapper modules in `infrastructure-modules`, and using `infrastructure-live` and Terragrunt for
1430
1430
deployments. In this approach, TFC is used as a https://www.terraform.io/docs/backends/types/remote.html[remote backend]
1431
1431
for Terraform. You use Terragrunt to run deployments from the CLI, which in turn invokes Terraform on the TFC backend.
1432
1432
The TFC UI is used for audit and tracking capabilities, but not for executing Terraform runs.
@@ -1708,9 +1708,9 @@ There are a few ways to set these credentials:
1708
1708
1709
1709
. Create all the workspaces manually in advance, and set the `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` in each workspace, as described in <<configure_credentials_and_variables>>.
1710
1710
. Create all the workspaces manually by running `terragrunt init`, and still set up the environment variables as previously mentioned.
1711
-
. To set this up programatically, you can use the https://www.terraform.io/docs/providers/tfe/r/workspace.html[`tfe_workspace`] and https://www.terraform.io/docs/providers/tfe/r/variable.html[`tfe_variable`] resources to configure the workspaces with Terraform.
1711
+
. To set this up programmatically, you can use the https://www.terraform.io/docs/providers/tfe/r/workspace.html[`tfe_workspace`] and https://www.terraform.io/docs/providers/tfe/r/variable.html[`tfe_variable`] resources to configure the workspaces with Terraform.
1712
1712
1713
-
In all cases, you'll need to ensure that your workspaces stay in sync with your Terragrunt configuration. Each time you add a new module in Terragrunt, you'll need a corresponding workpace. Furthermore, if you rotate your AWS API keys, you'll need to update them within each workspace. For that reason, the final option above is recommended.
1713
+
In all cases, you'll need to ensure that your workspaces stay in sync with your Terragrunt configuration. Each time you add a new module in Terragrunt, you'll need a corresponding workspace. Furthermore, if you rotate your AWS API keys, you'll need to update them within each workspace. For that reason, the final option above is recommended.
0 commit comments