Skip to content

Commit

Permalink
Fixing Documentation issues with Secrets Manager (#183)
Browse files Browse the repository at this point in the history
* Fixing Documentation issues with Secrets Manager

* Fixing Documentation issues with Secrets Manager
  • Loading branch information
elamaran11 authored Jun 16, 2023
1 parent de8c123 commit c705238
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion docs/contributors.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,12 @@ Our goal is to make it easier to use AWS Open Source Observability Services.
The core team include the following people:

* Abhi Khanna
* Elamaran Shanmugam
* Imaya Kumar Jagannathan
* Jerome DECQ
* Kevin Lewin
* Michael Hausenblas
* Munish Dabra
* Ramesh Kumar Venkatraman
* Rodrigue Koffi
* Toshal Dudhwhala
* Vara Bonthu
Expand Down
4 changes: 2 additions & 2 deletions docs/eks/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ Ensure you have necessary IAM permissions (`CreateWorkspaceApiKey, DeleteWorkspa

!!! note
Starting version v2.5.x and above, we use Grafana Operator and External Secrets to
manage Grafana contents. Your API Key will be stored securely on AWS Secrets Manager
manage Grafana contents. Your API Key will be stored securely on AWS SSM Parameter Store
and the Grafana Operator will use it to sync dashboards, folders and data sources.
Read more [here](https://aws-observability.github.io/terraform-aws-observability-accelerator/concepts/).

Expand Down Expand Up @@ -231,7 +231,7 @@ export GO_AMG_API_KEY=$(aws grafana create-workspace-api-key \
--output text)
```

- Finally, update the Grafana API key secret in AWS Secrets Manager using the above new Grafana API key:
- Finally, update the Grafana API key secret in AWS SSM Parameter Store using the above new Grafana API key:

```bash
aws aws ssm put-parameter \
Expand Down
2 changes: 1 addition & 1 deletion modules/eks-monitoring/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This module provides EKS cluster monitoring with the following resources:
- Logs with [AWS for FluentBit](https://github.com/aws/aws-for-fluent-bit)
- Installs Grafana Operator to add AWS data sources and create Grafana Dashboards to Amazon Managed Grafana.
- Installs FluxCD to perform GitOps sync of a Git Repo to EKS Cluster. We will use this later for creating Grafana Dashboards and AWS datasources to Amazon Managed Grafana.
- Installs External Secrets Operator to retrieve and Sync the Grafana API keys.
- Installs External Secrets Operator to retrieve and Sync the Grafana API keys from AWS SSM Parameter Store.
- Amazon Managed Grafana Dashboard and data source
- Alerts and recording rules with AWS Managed Service for Prometheus

Expand Down
2 changes: 1 addition & 1 deletion modules/eks-monitoring/add-ons/external-secrets/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# External Secrets Operator Kubernetes addon

This deploys an EKS Cluster with the External Secrets Operator. The cluster is populated with a ClusterSecretStore and ExternalSecret using Grafana API Key secret from AWS Secret Manager. A secret store for each AWS Secret Manager is created. Store use IRSA (IAM Roles For Service Account) to retrieve the secret values from AWS.
This deploys an EKS Cluster with the External Secrets Operator. The cluster is populated with a ClusterSecretStore and ExternalSecret using Grafana API Key secret from AWS SSM Parameter Store. A secret store for each AWS SSM Parameter Store is created. Store use IRSA (IAM Roles For Service Account) to retrieve the secret values from AWS.

<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
## Requirements
Expand Down

0 comments on commit c705238

Please sign in to comment.