You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/jumpstart/action-items.mdx
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ Before we can get started, here's the minimum information we need from you.
63
63
64
64
Please also provision a single test user in your IdP for Cloud Posse to use for testing and add those user credentials to 1Password.
65
65
66
-
-[AWS Identity Center (SSO) ClickOps](/layers/identity/aws-sso/)
66
+
-[Setup AWS Identity Center (SSO)](/layers/identity/aws-sso/)
67
67
68
68
<Admonitiontype="caution">
69
69
- GSuite does not automatically sync Users and Groups with AWS Identity Center without additional configuration! If using GSuite as an IdP, considering deploying the [ssosync tool](https://github.com/awslabs/ssosync).
@@ -76,10 +76,9 @@ Before we can get started, here's the minimum information we need from you.
76
76
77
77
If deploying AWS SAML as an alternative to AWS SSO, we will need a separate configuration and metadata file. Again, please refer to the relevant linked guide.
78
78
79
-
-[GSuite](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/): Follow Steps 1 through 7. This document refers to Appstream, but the process will be the same for AWS.
Please see the following guide and follow the steps to export metadata for your Identity Provider integration. All steps in AWS will be handled by Cloud Posse.
Copy file name to clipboardExpand all lines: docs/layers/accounts/design-decisions/decide-on-aws-organization-strategy.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Cloud Posse recommends starting with a **Net-New Organization**
22
22
23
23
- Only one AWS Control Tower can exist in an organization.
24
24
25
-
- AWS Control Tower only recenlty became managable with Terraform, and full support is not availble.
25
+
- AWS Control Tower only recently became manageable with Terraform, and full support is not available.
26
26
Depending on the Scope of Work, Cloud Posse is usually responsible for provisioning accounts with terraform which requires all the same access as Control Tower.
27
27
28
28
- Member accounts can only be provisioned from the top-level root “organization” account
Copy file name to clipboardExpand all lines: docs/layers/ecs/tutorials/1password-scim-bridge.mdx
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ import CollapsibleText from "@site/src/components/CollapsibleText";
16
16
17
17
## Implementation
18
18
19
-
The implementation of this is fairly simple. We will generate credentials for the SCIM bridge in 1Password, store them in AWS SSM Parameter Store, deploy the SCIM bridge ECS service, and then finally connect your choosen identity provider.
19
+
The implementation of this is fairly simple. We will generate credentials for the SCIM bridge in 1Password, store them in AWS SSM Parameter Store, deploy the SCIM bridge ECS service, and then finally connect your chosen identity provider.
20
20
21
21
<Steps>
22
22
<Step>
@@ -88,8 +88,6 @@ The implementation of this is fairly simple. We will generate credentials for th
Copy file name to clipboardExpand all lines: docs/layers/eks/design-decisions/decide-on-secrets-management-for-eks.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,6 @@ We recommend using the External Secrets Operator with AWS SSM Parameter Store. T
57
57
58
58
However, we are in the process of evaluating the AWS Secrets Manager secrets with Kubernetes Secrets Store CSI Driver solution. This is the AWS supported option and may be a better long-term solution. We will build the required Terraform component to support this solution.
59
59
60
-
## Consquences
60
+
## Consequences
61
61
62
62
We will develop the `eks/secrets-store-csi-driver` component using the [Secrets Store CSI Driver](https://secrets-store-csi-driver.sigs.k8s.io/getting-started/installation)
Copy file name to clipboardExpand all lines: docs/layers/identity/aws-saml.mdx
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,11 @@ identity. You can use this federated identity to connect directly to a given AWS
30
30
Here are some example setup references:
31
31
<TabsqueryString="idp">
32
32
<TabItemvalue="google"label="Google Workspace">
33
-
Follow the [AWS documentation for Google Workspace](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/). Once you have completed the setup, download the metadata file.
33
+
<Steps>
34
+
1. Open the [AWS documentation for GSuite](https://aws.amazon.com/blogs/desktop-and-application-streaming/setting-up-g-suite-saml-2-0-federation-with-amazon-appstream-2-0/)
35
+
1. Follow Steps 1 through 7. This document refers to Appstream, but the process will be the same for AWS.
36
+
1. Once you have completed the setup, download the metadata file.
Copy file name to clipboardExpand all lines: docs/layers/project/create-repository.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Learn how to create a GitHub repository to host infrastructure tools and configu
69
69
With the GitHub repository prepared, we are now ready to import the Cloud Posse reference architecture.
70
70
71
71
<Admonitiontype="info"title="Where do I get these files?">
72
-
The contents of this respository are supplied as part of our [Quickstart](/quickstart) or [Jumpstart](/jumpstart) packages. For the remainder of this guide, we will assume you have access to the reference architecture configurations.
72
+
The contents of this repository are supplied as part of our [Quickstart](/quickstart) or [Jumpstart](/jumpstart) packages. For the remainder of this guide, we will assume you have access to the reference architecture configurations.
"message": "Application {{ .app.metadata.name }} is now running new version of deployments
86
86
manifests."
@@ -103,7 +103,7 @@ Our implementation of Argo CD breaks up notifications into "notifiers", "templat
103
103
eks/argocd:
104
104
vars:
105
105
notifications_templates:
106
-
app-deploy-succeded:
106
+
app-deploy-succeeded:
107
107
message: "Application {{ .app.metadata.name }} is now running new version of deployments"
108
108
webhook:
109
109
foo-repo-github-commit:
@@ -146,15 +146,15 @@ Our implementation of Argo CD breaks up notifications into "notifiers", "templat
146
146
- "app-deploy-started"
147
147
"when": "app.status.operationState.phase in ['Running'] or ( app.status.operationState.phase
148
148
== 'Succeeded' and app.status.health.status == 'Progressing' )"
149
-
trigger.on-deploy-succeded: |
149
+
trigger.on-deploy-succeeded: |
150
150
- "oncePer": "app.status.sync.revision"
151
151
"send":
152
-
- "app-deploy-succeded"
152
+
- "app-deploy-succeeded"
153
153
"when": "app.status.operationState.phase == 'Succeeded' and app.status.health.status
154
154
== 'Healthy'"
155
155
```
156
156
157
-
These triggers may trigger _multiple templates_. For example `trigger.on-deploy-succeded` triggers both `template.app-deploy-succeded.webhook.app-repo-github-commit-status` and `template.app-deploy-succeded.webhook.argocd-repo-github-commit-status`.
157
+
These triggers may trigger _multiple templates_. For example `trigger.on-deploy-succeeded` triggers both `template.app-deploy-succeeded.webhook.app-repo-github-commit-status` and `template.app-deploy-succeeded.webhook.argocd-repo-github-commit-status`.
0 commit comments