From 51071cdc460eb3b3abe8b1c0d275377ce5ace868 Mon Sep 17 00:00:00 2001 From: Tarasovych <24782123+Tarasovych@users.noreply.github.com> Date: Tue, 1 Jun 2021 12:13:50 +0300 Subject: [PATCH 1/2] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index b0fdc68e..fe167ffc 100644 --- a/README.md +++ b/README.md @@ -262,7 +262,7 @@ $ cp terraform/layer1-aws/demo.tfvars.example terraform/layer1-aws/terraform.tfv #### Secrets -In the root of `layer2-k8s` is the `aws-sm-secrets.tf` where several local variables expect [AWS Secrets Manager](https://console.aws.amazon.com/secretsmanager/home?region=us-east-1#!/home) secret with the pattern `/${local.name}-${local.environment}/infra/layer2-k8s`. These secrets are used for authentication with Kibana and Grafana using GitLab and register gitlab runner. +In the root of `layer2-k8s` is the `aws-sm-secrets.tf` where several local variables expect [AWS Secrets Manager](https://console.aws.amazon.com/secretsmanager/home?region=us-east-1#!/home) secret with the pattern `/${local.name_wo_region}/infra/layer2-k8s`. These secrets are used for authentication with Kibana and Grafana using GitLab and register gitlab runner. ```json { From 4b1804fa7f793c12023cf7875b52b8015a541fbc Mon Sep 17 00:00:00 2001 From: Tarasovych <24782123+Tarasovych@users.noreply.github.com> Date: Tue, 1 Jun 2021 13:09:40 +0300 Subject: [PATCH 2/2] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index fe167ffc..64ddcaad 100644 --- a/README.md +++ b/README.md @@ -235,7 +235,7 @@ Further in the [IAM](https://console.aws.amazon.com/iam/home#/home) console: ``` - Go [here](https://docs.aws.amazon.com/neptune/latest/userguide/iam-auth-temporary-credentials.html) to learn how to get temporary session tokens and assume role -- Alternatively, to use your `awscli`, `terraform` and other CLI utils with [MFA](https://aws.amazon.com/premiumsupport/knowledge-center/authenticate-mfa-cli/)and roles, you can use `aws-mfa`, `aws-vault` and `awsudo` +- Alternatively, to use your `awscli`, `terraform` and other CLI utils with [MFA](https://aws.amazon.com/premiumsupport/knowledge-center/authenticate-mfa-cli/) and roles, you can use `aws-mfa`, `aws-vault` and `awsudo` ## How to use this repo