Skip to content

Commit d12201d

Browse files
authored
Fix: README Formatting for Docusarus (#1084)
1 parent b17bb96 commit d12201d

File tree

11 files changed

+53
-30
lines changed

11 files changed

+53
-30
lines changed

modules/account/README.md

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,9 @@ This component is responsible for provisioning the full account hierarchy along
44
includes the ability to associate Service Control Policies (SCPs) to the Organization, each Organizational Unit and
55
account.
66

7-
:::info Part of a
7+
:::info
8+
9+
Part of a
810
[cold start](https://docs.cloudposse.com/reference-architecture/how-to-guides/implementation/enterprise/implement-aws-cold-start)
911
so it has to be initially run with `SuperAdmin` role.
1012

@@ -176,11 +178,13 @@ SuperAdmin) credentials you have saved in 1Password.
176178

177179
#### Request an increase in the maximum number of accounts allowed
178180

179-
:::caution Make sure your support plan for the _root_ account was upgraded to the "Business" level (or Higher). This is
180-
necessary to expedite the quota increase requests, which could take several days on a basic support plan. Without it,
181-
AWS support will claim that since we’re not currently utilizing any of the resources, so they do not want to approve the
182-
requests. AWS support is not aware of your other organization. If AWS still gives you problems, please escalate to your
183-
AWS TAM. See [AWS](https://docs.cloudposse.com/reference-architecture/reference/aws).
181+
:::caution
182+
183+
Make sure your support plan for the _root_ account was upgraded to the "Business" level (or Higher). This is necessary
184+
to expedite the quota increase requests, which could take several days on a basic support plan. Without it, AWS support
185+
will claim that since we’re not currently utilizing any of the resources, so they do not want to approve the requests.
186+
AWS support is not aware of your other organization. If AWS still gives you problems, please escalate to your AWS TAM.
187+
See [AWS](https://docs.cloudposse.com/reference-architecture/reference/aws).
184188

185189
:::
186190

@@ -314,15 +318,19 @@ atmos terraform import account --stack core-gbl-root 'aws_organizations_organiza
314318
AWS accounts and organizational units are generated dynamically by the `terraform/account` component using the
315319
configuration in the `gbl-root` stack.
316320
317-
:::info _**Special note:**_ \*\*\*\* In the rare case where you will need to be enabling non-default AWS Regions,
318-
temporarily comment out the `DenyRootAccountAccess` service control policy setting in `gbl-root.yaml`. You will restore
319-
it later, after enabling the optional Regions. See related:
321+
:::info _**Special note:**_
322+
323+
In the rare case where you will need to be enabling non-default AWS Regions, temporarily comment out the
324+
`DenyRootAccountAccess` service control policy setting in `gbl-root.yaml`. You will restore it later, after enabling the
325+
optional Regions. See related:
320326
[Decide on Opting Into Non-default Regions](https://docs.cloudposse.com/reference-architecture/design-decisions/cold-start/decide-on-opting-into-non-default-regions)
321327
322328
:::
323329
324-
:::caution **You must wait until your quota increase request has been granted.** If you try to create the accounts
325-
before the quota increase is granted, you can expect to see failures like `ACCOUNT_NUMBER_LIMIT_EXCEEDED`.
330+
:::caution You must wait until your quota increase request has been granted
331+
332+
If you try to create the accounts before the quota increase is granted, you can expect to see failures like
333+
`ACCOUNT_NUMBER_LIMIT_EXCEEDED`.
326334
327335
:::
328336

modules/datadog-lambda-forwarder/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ components:
8585
|------|-------------|------|---------|:--------:|
8686
| <a name="input_additional_tag_map"></a> [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.<br>This is for some rare cases where resources want additional configuration of tags<br>and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no |
8787
| <a name="input_attributes"></a> [attributes](#input\_attributes) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,<br>in the order they appear in the list. New attributes are appended to the<br>end of the list. The elements of the list are joined by the `delimiter`<br>and treated as a single ID element. | `list(string)` | `[]` | no |
88-
| <a name="input_cloudwatch_forwarder_event_patterns"></a> [cloudwatch\_forwarder\_event\_patterns](#input\_cloudwatch\_forwarder\_event\_patterns) | Map of title => CloudWatch Event patterns to forward to Datadog. Event structure from here: <https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEventsandEventPatterns.html#CloudWatchEventsPatterns><br>Example:<pre>hcl<br>cloudwatch_forwarder_event_rules = {<br> "guardduty" = {<br> source = ["aws.guardduty"]<br> detail-type = ["GuardDuty Finding"]<br> }<br> "ec2-terminated" = {<br> source = ["aws.ec2"]<br> detail-type = ["EC2 Instance State-change Notification"]<br> detail = {<br> state = ["terminated"]<br> }<br> }<br>}</pre> | <pre>map(object({<br> version = optional(list(string))<br> id = optional(list(string))<br> detail-type = optional(list(string))<br> source = optional(list(string))<br> account = optional(list(string))<br> time = optional(list(string))<br> region = optional(list(string))<br> resources = optional(list(string))<br> detail = optional(map(list(string)))<br> }))</pre> | `{}` | no |
88+
| <a name="input_cloudwatch_forwarder_event_patterns"></a> [cloudwatch\_forwarder\_event\_patterns](#input\_cloudwatch\_forwarder\_event\_patterns) | Map of title to CloudWatch Event patterns to forward to Datadog. Event structure from here: https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEventsandEventPatterns.html#CloudWatchEventsPatterns<br>Example:<pre>hcl<br>cloudwatch_forwarder_event_rules = {<br> "guardduty" = {<br> source = ["aws.guardduty"]<br> detail-type = ["GuardDuty Finding"]<br> }<br> "ec2-terminated" = {<br> source = ["aws.ec2"]<br> detail-type = ["EC2 Instance State-change Notification"]<br> detail = {<br> state = ["terminated"]<br> }<br> }<br>}</pre> | <pre>map(object({<br> version = optional(list(string))<br> id = optional(list(string))<br> detail-type = optional(list(string))<br> source = optional(list(string))<br> account = optional(list(string))<br> time = optional(list(string))<br> region = optional(list(string))<br> resources = optional(list(string))<br> detail = optional(map(list(string)))<br> }))</pre> | `{}` | no |
8989
| <a name="input_cloudwatch_forwarder_log_groups"></a> [cloudwatch\_forwarder\_log\_groups](#input\_cloudwatch\_forwarder\_log\_groups) | Map of CloudWatch Log Groups with a filter pattern that the Lambda forwarder will send logs from. For example: { mysql1 = { name = "/aws/rds/maincluster", filter\_pattern = "" } | `map(map(string))` | `{}` | no |
9090
| <a name="input_context"></a> [context](#input\_context) | Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. | `any` | <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
9191
| <a name="input_context_tags"></a> [context\_tags](#input\_context\_tags) | List of context tags to add to each monitor | `set(string)` | <pre>[<br> "namespace",<br> "tenant",<br> "environment",<br> "stage"<br>]</pre> | no |
@@ -154,7 +154,7 @@ components:
154154

155155
## References
156156

157-
- Datadog's [documentation about provisioning keys](https://docs.datadoghq.com/account_management/api-app-keys
157+
- Datadog's [documentation about provisioning keys](https://docs.datadoghq.com/account_management/api-app-keys)
158158
- [cloudposse/terraform-aws-components](https://github.com/cloudposse/terraform-aws-components/tree/main/modules/datadog-lambda-forwarder) -
159159
Cloud Posse's upstream component
160160

modules/datadog-lambda-forwarder/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ variable "cloudwatch_forwarder_event_patterns" {
127127
detail = optional(map(list(string)))
128128
}))
129129
description = <<-EOF
130-
Map of title => CloudWatch Event patterns to forward to Datadog. Event structure from here: <https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEventsandEventPatterns.html#CloudWatchEventsPatterns>
130+
Map of title to CloudWatch Event patterns to forward to Datadog. Event structure from here: https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEventsandEventPatterns.html#CloudWatchEventsPatterns
131131
Example:
132132
```hcl
133133
cloudwatch_forwarder_event_rules = {

modules/dns-primary/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,9 @@ components:
9393
YourVeryLongStringGoesHere
9494
```
9595

96-
:::info Use the [acm](https://docs.cloudposse.com/components/library/aws/acm) component for more advanced certificate
96+
:::info
97+
98+
Use the [acm](https://docs.cloudposse.com/components/library/aws/acm) component for more advanced certificate
9799
requirements.
98100

99101
:::

modules/ecr/README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,10 @@ This utilizes
66
to assign accounts to various roles. It is also compatible with the
77
[GitHub Actions IAM Role mixin](https://github.com/cloudposse/terraform-aws-components/blob/master/mixins/github-actions-iam-role/README-github-action-iam-role.md).
88

9-
:::caution Older versions of our reference architecture have an`eks-iam` component that needs to be updated to provide
10-
sufficient IAM roles to allow pods to pull from ECR repos
9+
:::caution
10+
11+
Older versions of our reference architecture have an`eks-iam` component that needs to be updated to provide sufficient
12+
IAM roles to allow pods to pull from ECR repos
1113

1214
:::
1315

modules/eks/actions-runner-controller/README.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -384,9 +384,11 @@ scale down to zero before finishing all the jobs, leaving some waiting indefinit
384384
the `max_duration` to a time long enough to cover the full time a job may have to wait between the time it is queued and
385385
the time it finishes, assuming that the HRA scales up the pool by 1 and runs the job on the new runner.
386386

387-
:::info If there are more jobs queued than there are runners allowed by `maxReplicas`, the timeout timer does not start
388-
on the capacity reservation until enough reservations ahead of it are removed for it to be considered as representing
389-
and active job. Although there are some edge cases regarding `max_duration` that seem not to be covered properly (see
387+
:::info
388+
389+
If there are more jobs queued than there are runners allowed by `maxReplicas`, the timeout timer does not start on the
390+
capacity reservation until enough reservations ahead of it are removed for it to be considered as representing and
391+
active job. Although there are some edge cases regarding `max_duration` that seem not to be covered properly (see
390392
[actions-runner-controller issue #2466](https://github.com/actions/actions-runner-controller/issues/2466)), they only
391393
merit adding a few extra minutes to the timeout.
392394

modules/eks/datadog-agent/README.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,8 +105,11 @@ for `<integration name>.yaml`.
105105

106106
#### Sample Yaml
107107

108-
:::caution The key of a filename must match datadog docs, which is `<INTEGRATION_NAME>.yaml`
108+
:::caution
109+
110+
The key of a filename must match datadog docs, which is `<INTEGRATION_NAME>.yaml`
109111
[Datadog Cluster Checks](https://docs.datadoghq.com/agent/cluster_agent/clusterchecks/?tab=helm#configuration-from-static-configuration-files)
112+
110113
:::
111114

112115
Cluster Checks **can** be used for external URL testing (loadbalancer endpoints), whereas annotations **must** be used

modules/eks/github-actions-runner/README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,10 @@ NodeJS or `dcarbone/install-jq-action` to install `jq`. You can also install pac
2727
`awalsh128/cache-apt-pkgs-action`, which has the advantage of being able to skip the installation if the package is
2828
already installed, so you can more efficiently run the same workflow on GitHub hosted as well as self-hosted runners.
2929

30-
:::info There are (as of this writing) open feature requests to add some commonly needed packages to the official Runner
31-
Sets runner image. You can upvote these requests
30+
:::info
31+
32+
There are (as of this writing) open feature requests to add some commonly needed packages to the official Runner Sets
33+
runner image. You can upvote these requests
3234
[here](https://github.com/actions/actions-runner-controller/discussions/3168) and
3335
[here](https://github.com/orgs/community/discussions/80868) to help get them implemented.
3436

modules/github-runners/README.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,9 @@
22

33
This component is responsible for provisioning EC2 instances for GitHub runners.
44

5-
:::info We also have a similar component based on
5+
:::info
6+
7+
We also have a similar component based on
68
[actions-runner-controller](https://github.com/actions-runner-controller/actions-runner-controller) for Kubernetes.
79

810
:::
@@ -177,9 +179,11 @@ permissions “mode” for Self-hosted runners to Read-Only. The instructions fo
177179

178180
### Creating Registration Token
179181

180-
:::info We highly recommend using a GitHub Application with the github-action-token-rotator module to generate the
181-
Registration Token. This will ensure that the token is rotated and that the token is stored in SSM Parameter Store
182-
encrypted with KMS.
182+
:::info
183+
184+
We highly recommend using a GitHub Application with the github-action-token-rotator module to generate the Registration
185+
Token. This will ensure that the token is rotated and that the token is stored in SSM Parameter Store encrypted with
186+
KMS.
183187

184188
:::
185189

modules/redshift/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,14 +46,14 @@ components:
4646
| Name | Version |
4747
|------|---------|
4848
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
49-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4.17, <=4.67.0 |
49+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4.17, <= 4.67.0 |
5050
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 3.0 |
5151
5252
## Providers
5353
5454
| Name | Version |
5555
|------|---------|
56-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.17, <=4.67.0 |
56+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.17, <= 4.67.0 |
5757
| <a name="provider_random"></a> [random](#provider\_random) | >= 3.0 |
5858
5959
## Modules

0 commit comments

Comments
 (0)