Skip to content

Commit 1b97ed4

Browse files
committed
minor changes on readmes
1 parent a668ce5 commit 1b97ed4

File tree

5 files changed

+11
-11
lines changed

5 files changed

+11
-11
lines changed

05-iac/00-terraform/05-incorporando-recursos/07-demo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Cortamos el contenido en `network.tf`
4545

4646
Y lo añadimos a `instances.tf`
4747

48-
```tf
48+
```ini
4949
# INSTANCES #
5050
resource "aws_instance" "nginx1" {
5151
ami = nonsensitive(data.aws_ssm_parameter.ami.value)

05-iac/00-terraform/05-incorporando-recursos/09-demo.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Actualizamos `variables.tf`
4242
-}
4343
+
4444
+variable "subnets_cidr_block" {
45-
+ type = string
45+
+ type = list(string)
4646
+ description = "Subnet cidr block"
4747
+ default = ["10.0.0.0/24", "10.0.1.0/24"]
4848
+}
@@ -113,7 +113,7 @@ resource "aws_route_table_association" "rta-subnet1" {
113113

114114
Actualizamo `instances.tf`
115115

116-
```tf
116+
```ini
117117
# INSTANCES #
118118
resource "aws_instance" "nginx1" {
119119
ami = nonsensitive(data.aws_ssm_parameter.ami.value)
@@ -160,7 +160,7 @@ Necesitamos crear un `security group` adicional para el balanceador de carga, de
160160

161161
Actualizamos `network.tf`
162162

163-
```tf
163+
```ini
164164
# SECURITY GROUPS #
165165
resource "aws_security_group" "nginx-sg" {
166166
name = "nginx_sg"

05-iac/00-terraform/05-incorporando-recursos/10-demo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Si buscamos en la documentación `elastic load balancing v2`, encontraremos `aws
2020
2121
> EXERCISE: A partir de la documentación actualizar `loadbalancer.tf`
2222
23-
```tf
23+
```ini
2424
## aws_lb
2525
resource "aws_lb" "nginx" {
2626
name = "lc_web_alb"

05-iac/00-terraform/06-incorporando-nuevos-providers/15-demo.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ The final `json` looks like:
225225

226226
Actualizamos `s3.tf`
227227

228-
```tf
228+
```ini
229229
# aws_s3_bucket
230230
resource "aws_s3_bucket" "web_bucket" {
231231
bucket = local.s3_bucket_name
@@ -314,7 +314,7 @@ resource "aws_s3_bucket" "web_bucket" {
314314

315315
Actualizamos `s3.tf`
316316

317-
```tf
317+
```ini
318318
# ....
319319
# aws_s3_bucket_object
320320
resource "aws_s3_bucket_object" "website" {
@@ -341,7 +341,7 @@ resource "aws_s3_bucket_object" "graphic" {
341341

342342
Actualizamos `s3.tf`
343343

344-
```tf
344+
```ini
345345
# aws_iam_role
346346
resource "aws_iam_role" "allow_nginx_s3" {
347347
name = "allow_nginx_s3"
@@ -386,7 +386,7 @@ Ahora podemos asignar la `policy` al `role`
386386

387387
> EJERCICIO. Crear una `policy` que permita todas las acciones sobre S3.
388388
389-
```tf
389+
```ini
390390
# aws_iam_role_policy
391391
resource "aws_iam_role_policy" "allow_s3_all" {
392392
name = "allow_s3_all"
@@ -428,7 +428,7 @@ resource "aws_iam_role_policy" "allow_s3_all" {
428428

429429
Por útimo creamos el [perfil de instamcia](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html)
430430

431-
```tf
431+
```ini
432432
# aws_iam_instance_profile
433433
resource "aws_iam_instance_profile" "nginx_profile" {
434434
name = "nginx_profile"

06-monitoring/00-prometheus/.demos/06-querying-gauges-counters/readme.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ prometheus-2.32.1.linux-amd64/prometheus \
2626
--config.file="/opt/prometheus/prometheus.yaml"
2727
```
2828

29-
Verify targets at http://10.0.010:9090/targets.
29+
Verify targets at http://10.0.0.10:9090/targets.
3030

3131

3232
## 1. Gauge

0 commit comments

Comments
 (0)