diff --git a/dictionary-octopus.txt b/dictionary-octopus.txt index 18eda36ed6..85e7db6886 100644 --- a/dictionary-octopus.txt +++ b/dictionary-octopus.txt @@ -1,3 +1,4 @@ +ALLUSERSPROFILE apikey approot appsettings @@ -10,7 +11,9 @@ bootstrap bootstrapped bootstrapper childelement +choco cicd +classiclink cloudapi Cloudsmith Cmdn @@ -18,6 +21,7 @@ combinational comms COMPUTERNAME Conjur +cooldown createartifact creds cscfg @@ -27,6 +31,7 @@ Datacenter datetime deallocate deallocated +dearmor deployers deploymentannotation deploymentprocess @@ -46,6 +51,7 @@ groff healthcheck HKEY HKLM +hostnames hotfix hotfixes HSTS @@ -60,6 +66,7 @@ Istio istioctl ITSM jwks +keyrings Kubelet kustomization kustomize diff --git a/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx b/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx index 1450d4127c..2a64550914 100644 --- a/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx +++ b/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx @@ -61,14 +61,26 @@ Many of the steps described below require elevated permissions, or must be run a Debian/Ubuntu repository ```bash -apt-key adv --fetch-keys https://apt.octopus.com/public.key +sudo apt update && sudo apt install --no-install-recommends gnupg curl ca-certificates apt-transport-https && \ +sudo install -m 0755 -d /etc/apt/keyrings && \ +curl -fsSL https://apt.octopus.com/public.key | sudo gpg --dearmor -o /etc/apt/keyrings/octopus.gpg && \ +sudo chmod a+r /etc/apt/keyrings/octopus.gpg && \ +echo \ + "deb [arch="$(dpkg --print-architecture)" signed-by=/etc/apt/keyrings/octopus.gpg] https://apt.octopus.com/ \ + stable main" | \ + sudo tee /etc/apt/sources.list.d/octopus.list > /dev/null && \ +sudo apt update && sudo apt install tentacle + +# for legacy Ubuntu/Debian (< 18.04) use +# sudo apt update && sudo apt install --no-install-recommends gnupg curl ca-certificates apt-transport-https && \ +# curl -sSfL https://apt.octopus.com/public.key | sudo apt-key add - && \ +# sudo sh -c "echo deb https://apt.octopus.com/ stable main > /etc/apt/sources.list.d/octopus.com.list" && \ +# sudo apt update && sudo apt install tentacle -add-apt-repository "deb https://apt.octopus.com/ stretch main" # for Raspbian use # sh -c "echo 'deb https://apt.octopus.com/ buster main' >> /etc/apt/sources.list" - -apt-get update -apt-get install tentacle +# apt-get update +# apt-get install tentacle ``` diff --git a/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md b/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md index 27bbe72d25..5c3807200b 100644 --- a/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md +++ b/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md @@ -11,7 +11,7 @@ AWS CloudFormation is a great tool to use to provisions resources, however, it d The following example will use Terraform to dynamically create worker machines based on auto-scaling rules. Instead of defining the Terraform template directly in the step template, this example will make use of a package. The package will consist of the following files: - autoscaling.tf -- autoscalingpolicy.tf +- autoscaling-policy.tf - backend.tf - installTentacle.sh - provider.tf @@ -30,24 +30,24 @@ This file contains the definitions for creating the auto-scaling configuration i

``` -resource "aws_launch_configuration" "dynamic-linux-worker-launchconfig" { - name_prefix = "dynamic-linux-worker-launchconfig" +resource "aws_launch_configuration" "dynamic-linux-worker-launch-config" { + name_prefix = "dynamic-linux-worker-launch-config" image_id = "${var.LINUX_AMIS}" instance_type = "t2.micro" - security_groups = ["${aws_security_group.allow-octopusserver.id}"] + security_groups = ["${aws_security_group.allow-octopus-server.id}"] # script to run when created user_data = "${file("installTentacle.sh")}" } -resource "aws_launch_configuration" "dynamic-windows-worker-launchconfig" { - name_prefix = "dynamic-windows-worker-launchconfig" +resource "aws_launch_configuration" "dynamic-windows-worker-launch-config" { + name_prefix = "dynamic-windows-worker-launch-config" image_id = "${var.WINDOWS_AMIS}" instance_type = "t2.micro" - security_groups = ["${aws_security_group.allow-octopusserver.id}"] + security_groups = ["${aws_security_group.allow-octopus-server.id}"] user_data = <<-EOT