Skip to content

Commit 72e33f8

Browse files
authored
Merge branch 'main' into patch-3
2 parents dd39351 + f35036c commit 72e33f8

2 files changed

Lines changed: 4 additions & 4 deletions

File tree

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ The Instance Termination Watcher is creating log and optional metrics for termin
7979

8080
This feature is Beta, changes will not trigger a major release as long in beta.
8181

82-
The Job Retry will allow you to retry scaling when a job is not started. When enabled the scale up lambda will send a retry message to the a SQS queue. The Job Retry lambda will check after a delay if the job is still queued, and if so, it will send a retry command to the scale up lambda via SQS. The feature is designed to be used with ephemeral runners. The feature is opt in, it will not be created by default.
82+
The Job Retry will allow you to retry scaling when a job is not started. When enabled the scale up lambda will send a retry message to the SQS queue. The Job Retry lambda will check after a delay if the job is still queued, and if so, it will send a retry command to the scale up lambda via SQS. The feature is designed to be used with ephemeral runners. The feature is opt in, it will not be created by default.
8383

8484
Consequences of enabling the feature are:
8585

modules/setup-iam-permissions/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
# Module - IAM setup for using boundaries
22

3-
This module is optional and only added as example. You can deploy the root terraform module via you own IAM user with the right credentials. Alternatively you can create a role to deploy the root module with a limit boundary set.
3+
This module is optional and only added as example. You can deploy the root terraform module via your own IAM user with the right credentials. Alternatively you can create a role to deploy the root module with a limit boundary set.
44

5-
This module will create an AWS IAM role that is required to use permission boundaries. The created rol can be used to deploy the root module.
5+
This module will create an AWS IAM role that is required to use permission boundaries. The created role can be used to deploy the root module.
66

77
## Usages
88

@@ -33,7 +33,7 @@ output "boundary" {
3333
}
3434
```
3535

36-
Next execute the created Terraform code `terraform init && terraform apply` The module will. You can use the created role in your terraform provider with assume role and the boundary as well the namespace needs to be set to the root module.
36+
Next execute the created Terraform code via `terraform init && terraform apply`. You can use the created role in your terraform provider with assume role and the boundary as well the namespace needs to be set to the root module.
3737

3838

3939
<!-- BEGIN_TF_DOCS -->

0 commit comments

Comments
 (0)