diff --git a/docs/modules/perforce/examples/complete.md b/docs/modules/perforce/examples/complete.md index ed6f516..e27e5ce 100644 --- a/docs/modules/perforce/examples/complete.md +++ b/docs/modules/perforce/examples/complete.md @@ -22,8 +22,8 @@ to the fully qualified domain name of an existing public hosted zone in the AWS reference architecture. The deployment steps below will get you up and running. 1. You will need the Cloud Game Development Toolkit's Perforce Helix Core Amazon Machine Image. This Amazon Machine - Image (AMI) can be build using - our [provided Packer template](https://github.com/aws-games/cloud-game-development-toolkit/tree/main/assets/packer/perforce/helix-core). + Image (AMI) can be built using + our [provided Packer template](../../../assets/packer/helix-core.md). This example uses the ARM64 version of this AMI, and leverages Amazon Graviton for the Helix Core instance. Follow our documentation for provisioning this AMI in your AWS account. diff --git a/modules/perforce/examples/complete/outputs.tf b/modules/perforce/examples/complete/outputs.tf index c91a51f..84c0c2b 100644 --- a/modules/perforce/examples/complete/outputs.tf +++ b/modules/perforce/examples/complete/outputs.tf @@ -4,11 +4,11 @@ output "helix_core_connection_string" { } output "helix_swarm_url" { - value = "swarm.perforce.${var.root_domain_name}" + value = "https://swarm.perforce.${var.root_domain_name}" description = "The URL for the Helix Swarm server." } output "helix_authentication_service_admin_url" { - value = "auth.perforce.${var.root_domain_name}/admin" + value = "https://auth.perforce.${var.root_domain_name}/admin" description = "The URL for the Helix Authentication Service admin page." } diff --git a/modules/perforce/examples/complete/security.tf b/modules/perforce/examples/complete/security.tf index 5a79be3..b76f4ae 100644 --- a/modules/perforce/examples/complete/security.tf +++ b/modules/perforce/examples/complete/security.tf @@ -68,7 +68,7 @@ resource "aws_vpc_security_group_ingress_rule" "perforce_helix_core_inbound_web_ referenced_security_group_id = module.perforce_helix_core.security_group_id } -# Egress for Perfoce Web Services ALB to Helix Swarm service +# Egress for Perforce Web Services ALB to Helix Swarm service resource "aws_vpc_security_group_egress_rule" "perforce_alb_outbound_helix_swarm" { security_group_id = aws_security_group.perforce_web_services_alb.id description = "Perforce ALB outbound to Helix Swarm"