Skip to content

Commit

Permalink
Merge pull request #3291 from consideRatio/pr/rem-uwhackweeks
Browse files Browse the repository at this point in the history
uwhackweeks: finalize cleanup of already removed cluster
  • Loading branch information
consideRatio authored Oct 19, 2023
2 parents 682ef1f + d1c619f commit 08ca35d
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 24 deletions.
2 changes: 1 addition & 1 deletion docs/topic/access-creds/cloud-auth.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ We have two ways to access AWS accounts.
There are three units of organization in AWS that are relevant to 2i2c.

AWS Accounts
: Collections of services and infrastructure that generated their own bills. Kind-of like `projects` in Google Cloud Platform. For example, the Kubernetes cluster we run for `uwhackweeks` runs in an Account dedicated for this.
: Collections of services and infrastructure that generated their own bills. Kind-of like `projects` in Google Cloud Platform. For example, the Kubernetes cluster `2i2c-aws-us` runs in a dedicated AWS Account.

AWS Organizations
: Organizations are basically collections of accounts. They make it easy to group **access** to multiple accounts via things like [AWS Single Sign On](cloud-access:aws-sso). Every AWS Organization has a "Management Account" that defines all of the other accounts in the organization.
Expand Down
21 changes: 0 additions & 21 deletions eksctl/ssh-keys/secret/uwhackweeks.key

This file was deleted.

4 changes: 2 additions & 2 deletions terraform/aws/projects/nasa-cryo.tfvars
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ hub_cloud_permissions = {
# buckets, without having to explicitly list them. However, we don't want
# to give access to all *internal* s3 buckets willy-nilly - this can be
# a massive security hole, especially if terraform state is also here.
# As a temporary measure, we allow-list buckets here. Same as uwhackweeks.
# As a temporary measure, we allow-list buckets here.
extra_iam_policy : <<-EOT
{
"Version": "2012-10-17",
Expand Down Expand Up @@ -64,7 +64,7 @@ hub_cloud_permissions = {
# buckets, without having to explicitly list them. However, we don't want
# to give access to all *internal* s3 buckets willy-nilly - this can be
# a massive security hole, especially if terraform state is also here.
# As a temporary measure, we allow-list buckets here. Same as uwhackweeks.
# As a temporary measure, we allow-list buckets here.
extra_iam_policy : <<-EOT
{
"Version": "2012-10-17",
Expand Down

0 comments on commit 08ca35d

Please sign in to comment.