Skip to content

Commit c705238

Browse files
authored
Fixing Documentation issues with Secrets Manager (#183)
* Fixing Documentation issues with Secrets Manager * Fixing Documentation issues with Secrets Manager
1 parent de8c123 commit c705238

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

docs/contributors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ Our goal is to make it easier to use AWS Open Source Observability Services.
99
The core team include the following people:
1010

1111
* Abhi Khanna
12+
* Elamaran Shanmugam
1213
* Imaya Kumar Jagannathan
1314
* Jerome DECQ
1415
* Kevin Lewin
1516
* Michael Hausenblas
1617
* Munish Dabra
17-
* Ramesh Kumar Venkatraman
1818
* Rodrigue Koffi
1919
* Toshal Dudhwhala
2020
* Vara Bonthu

docs/eks/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Ensure you have necessary IAM permissions (`CreateWorkspaceApiKey, DeleteWorkspa
9393

9494
!!! note
9595
Starting version v2.5.x and above, we use Grafana Operator and External Secrets to
96-
manage Grafana contents. Your API Key will be stored securely on AWS Secrets Manager
96+
manage Grafana contents. Your API Key will be stored securely on AWS SSM Parameter Store
9797
and the Grafana Operator will use it to sync dashboards, folders and data sources.
9898
Read more [here](https://aws-observability.github.io/terraform-aws-observability-accelerator/concepts/).
9999

@@ -231,7 +231,7 @@ export GO_AMG_API_KEY=$(aws grafana create-workspace-api-key \
231231
--output text)
232232
```
233233

234-
- Finally, update the Grafana API key secret in AWS Secrets Manager using the above new Grafana API key:
234+
- Finally, update the Grafana API key secret in AWS SSM Parameter Store using the above new Grafana API key:
235235

236236
```bash
237237
aws aws ssm put-parameter \

modules/eks-monitoring/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ This module provides EKS cluster monitoring with the following resources:
66
- Logs with [AWS for FluentBit](https://github.com/aws/aws-for-fluent-bit)
77
- Installs Grafana Operator to add AWS data sources and create Grafana Dashboards to Amazon Managed Grafana.
88
- Installs FluxCD to perform GitOps sync of a Git Repo to EKS Cluster. We will use this later for creating Grafana Dashboards and AWS datasources to Amazon Managed Grafana.
9-
- Installs External Secrets Operator to retrieve and Sync the Grafana API keys.
9+
- Installs External Secrets Operator to retrieve and Sync the Grafana API keys from AWS SSM Parameter Store.
1010
- Amazon Managed Grafana Dashboard and data source
1111
- Alerts and recording rules with AWS Managed Service for Prometheus
1212

modules/eks-monitoring/add-ons/external-secrets/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# External Secrets Operator Kubernetes addon
22

3-
This deploys an EKS Cluster with the External Secrets Operator. The cluster is populated with a ClusterSecretStore and ExternalSecret using Grafana API Key secret from AWS Secret Manager. A secret store for each AWS Secret Manager is created. Store use IRSA (IAM Roles For Service Account) to retrieve the secret values from AWS.
3+
This deploys an EKS Cluster with the External Secrets Operator. The cluster is populated with a ClusterSecretStore and ExternalSecret using Grafana API Key secret from AWS SSM Parameter Store. A secret store for each AWS SSM Parameter Store is created. Store use IRSA (IAM Roles For Service Account) to retrieve the secret values from AWS.
44

55
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
66
## Requirements

0 commit comments

Comments
 (0)