diff --git a/dictionary-octopus.txt b/dictionary-octopus.txt
index 18eda36ed6..85e7db6886 100644
--- a/dictionary-octopus.txt
+++ b/dictionary-octopus.txt
@@ -1,3 +1,4 @@
+ALLUSERSPROFILE
apikey
approot
appsettings
@@ -10,7 +11,9 @@ bootstrap
bootstrapped
bootstrapper
childelement
+choco
cicd
+classiclink
cloudapi
Cloudsmith
Cmdn
@@ -18,6 +21,7 @@ combinational
comms
COMPUTERNAME
Conjur
+cooldown
createartifact
creds
cscfg
@@ -27,6 +31,7 @@ Datacenter
datetime
deallocate
deallocated
+dearmor
deployers
deploymentannotation
deploymentprocess
@@ -46,6 +51,7 @@ groff
healthcheck
HKEY
HKLM
+hostnames
hotfix
hotfixes
HSTS
@@ -60,6 +66,7 @@ Istio
istioctl
ITSM
jwks
+keyrings
Kubelet
kustomization
kustomize
diff --git a/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx b/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx
index 1450d4127c..2a64550914 100644
--- a/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx
+++ b/src/pages/docs/infrastructure/deployment-targets/tentacle/linux/index.mdx
@@ -61,14 +61,26 @@ Many of the steps described below require elevated permissions, or must be run a
Debian/Ubuntu repository
```bash
-apt-key adv --fetch-keys https://apt.octopus.com/public.key
+sudo apt update && sudo apt install --no-install-recommends gnupg curl ca-certificates apt-transport-https && \
+sudo install -m 0755 -d /etc/apt/keyrings && \
+curl -fsSL https://apt.octopus.com/public.key | sudo gpg --dearmor -o /etc/apt/keyrings/octopus.gpg && \
+sudo chmod a+r /etc/apt/keyrings/octopus.gpg && \
+echo \
+ "deb [arch="$(dpkg --print-architecture)" signed-by=/etc/apt/keyrings/octopus.gpg] https://apt.octopus.com/ \
+ stable main" | \
+ sudo tee /etc/apt/sources.list.d/octopus.list > /dev/null && \
+sudo apt update && sudo apt install tentacle
+
+# for legacy Ubuntu/Debian (< 18.04) use
+# sudo apt update && sudo apt install --no-install-recommends gnupg curl ca-certificates apt-transport-https && \
+# curl -sSfL https://apt.octopus.com/public.key | sudo apt-key add - && \
+# sudo sh -c "echo deb https://apt.octopus.com/ stable main > /etc/apt/sources.list.d/octopus.com.list" && \
+# sudo apt update && sudo apt install tentacle
-add-apt-repository "deb https://apt.octopus.com/ stretch main"
# for Raspbian use
# sh -c "echo 'deb https://apt.octopus.com/ buster main' >> /etc/apt/sources.list"
-
-apt-get update
-apt-get install tentacle
+# apt-get update
+# apt-get install tentacle
```
diff --git a/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md b/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md
index 27bbe72d25..5c3807200b 100644
--- a/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md
+++ b/src/pages/docs/runbooks/runbook-examples/terraform/provision-aws-with-terraform.md
@@ -11,7 +11,7 @@ AWS CloudFormation is a great tool to use to provisions resources, however, it d
The following example will use Terraform to dynamically create worker machines based on auto-scaling rules. Instead of defining the Terraform template directly in the step template, this example will make use of a package. The package will consist of the following files:
- autoscaling.tf
-- autoscalingpolicy.tf
+- autoscaling-policy.tf
- backend.tf
- installTentacle.sh
- provider.tf
@@ -30,24 +30,24 @@ This file contains the definitions for creating the auto-scaling configuration i
```
-resource "aws_launch_configuration" "dynamic-linux-worker-launchconfig" {
- name_prefix = "dynamic-linux-worker-launchconfig"
+resource "aws_launch_configuration" "dynamic-linux-worker-launch-config" {
+ name_prefix = "dynamic-linux-worker-launch-config"
image_id = "${var.LINUX_AMIS}"
instance_type = "t2.micro"
- security_groups = ["${aws_security_group.allow-octopusserver.id}"]
+ security_groups = ["${aws_security_group.allow-octopus-server.id}"]
# script to run when created
user_data = "${file("installTentacle.sh")}"
}
-resource "aws_launch_configuration" "dynamic-windows-worker-launchconfig" {
- name_prefix = "dynamic-windows-worker-launchconfig"
+resource "aws_launch_configuration" "dynamic-windows-worker-launch-config" {
+ name_prefix = "dynamic-windows-worker-launch-config"
image_id = "${var.WINDOWS_AMIS}"
instance_type = "t2.micro"
- security_groups = ["${aws_security_group.allow-octopusserver.id}"]
+ security_groups = ["${aws_security_group.allow-octopus-server.id}"]
user_data = <<-EOT