Skip to content

Commit a19df7e

Browse files
authored
doc formatting edits (#990)
1 parent 2be1447 commit a19df7e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

website/docs/index.html.markdown

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ In order to enable the Terraform MongoDB Atlas Provider with AWS SM, please foll
8888
"private_key":"secret2"
8989
}
9090
```
91-
2. Create an AWS IAM Role to attach to the AWS STS (Secrutiy Token Service) generated short lived API keys. This is required since STS generated API Keys by default have restricted permissions and need to have their permissions elevated in order to authenticate with Terraform. Take note of Role ARN and ensure IAM Role has permission for “sts:AssumeRole” . For example:
91+
2. Create an AWS IAM Role to attach to the AWS STS (Security Token Service) generated short lived API keys. This is required since STS generated API Keys by default have restricted permissions and need to have their permissions elevated in order to authenticate with Terraform. Take note of Role ARN and ensure IAM Role has permission for “sts:AssumeRole” . For example:
9292
```
9393
{
9494
"Version": "2012-10-17",
@@ -106,7 +106,7 @@ In order to enable the Terraform MongoDB Atlas Provider with AWS SM, please foll
106106
```
107107
Note: this policy may be overly broad for many use cases, feel free to adjust accordingly to your organization's needs.
108108

109-
3. In your terminal store as environmental variables AWS API Keys (while you can also hardcode in config files these will then be stored as plain text in .tfstate file and should be avoided if possible). For example:
109+
3. In terminal, store as environmental variables AWS API Keys (while you can also hardcode in config files these will then be stored as plain text in .tfstate file and should be avoided if possible). For example:
110110
```
111111
export AWS_ACCESS_KEY_ID="secret"
112112
export AWS_SECRET_ACCESS_KEY="secret”
@@ -140,7 +140,7 @@ provider "mongodbatlas" {
140140
```
141141
Note: `aws_access_key_id`, `aws_secret_access_key`, and `aws_session_token` can also be passed in using environment variables i.e. aws_access_key_id will accept AWS_ACCESS_KEY_ID and TF_VAR_AWS_ACCESS_KEY_ID as a default value in place of value in a terraform file variable. Also `sts_endpoint` will be generated on behalf of user if not provider.
142142

143-
7. `terraform init`
143+
7. In terminal, `terraform init`
144144

145145
### Static Credentials
146146

0 commit comments

Comments
 (0)