diff --git a/.spelling b/.spelling index 9de9be48b..c3e6fcde4 100644 --- a/.spelling +++ b/.spelling @@ -127,4 +127,5 @@ sheetal joshi keda AIML -DCGM \ No newline at end of file +DCGM +Mountpoint \ No newline at end of file diff --git a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf index 9a68745ff..39a0b0f49 100644 --- a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf +++ b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf @@ -17,8 +17,8 @@ module "mountpoint_s3_csi_driver_irsa" { # IAM policy to attach to driver attach_mountpoint_s3_csi_policy = true - mountpoint_s3_csi_bucket_arns = [aws_s3_bucket.mountpoint-s3.arn] - mountpoint_s3_csi_path_arns = ["${aws_s3_bucket.mountpoint-s3.arn}/*"] + mountpoint_s3_csi_bucket_arns = [aws_s3_bucket.mountpoint_s3.arn] + mountpoint_s3_csi_path_arns = ["${aws_s3_bucket.mountpoint_s3.arn}/*"] oidc_providers = { main = { @@ -43,7 +43,7 @@ resource "aws_iam_role_policy" "eks_workshop_ide_s3_put_access" { { "Effect": "Allow", "Action": "s3:PutObject", - "Resource": "${aws_s3_bucket.mountpoint-s3.arn}/*" + "Resource": "${aws_s3_bucket.mountpoint_s3.arn}/*" } ] } diff --git a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/outputs.tf b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/outputs.tf index 27804d829..6764cf813 100644 --- a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/outputs.tf +++ b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/outputs.tf @@ -2,7 +2,7 @@ output "environment_variables" { description = "Environment variables to be added to the IDE shell" value = { S3_CSI_ADDON_ROLE = module.mountpoint_s3_csi_driver_irsa.iam_role_arn - BUCKET_NAME = aws_s3_bucket.mountpoint-s3.id + BUCKET_NAME = aws_s3_bucket.mountpoint_s3.id EKS_CLUSTER_NAME = var.eks_cluster_id } } \ No newline at end of file diff --git a/website/docs/fundamentals/storage/mountpoint-s3/30-persistent-object-storage-with-mountpoint-for-amazon-s3.md b/website/docs/fundamentals/storage/mountpoint-s3/30-persistent-object-storage-with-mountpoint-for-amazon-s3.md index 525cd3fc8..7409ac673 100644 --- a/website/docs/fundamentals/storage/mountpoint-s3/30-persistent-object-storage-with-mountpoint-for-amazon-s3.md +++ b/website/docs/fundamentals/storage/mountpoint-s3/30-persistent-object-storage-with-mountpoint-for-amazon-s3.md @@ -3,7 +3,7 @@ title: Persistent Object Storage with Mountpoint for Amazon S3 sidebar_position: 30 --- -Remember that our end goal is to have an image host application that **scales horozontally** and has **persistent storage** backed by Amazon S3. In the previous steps we created a staging directory for our image objects, then we downloaded the image assets into the staging directory and uploaded them into our S3 bucket. Finally, we installed the Mountpoint for Amazon S3 CSI driver and added it to our environment. We now need to attach our pods to use this PV provided by the Mountpoint for Amazon S3 CSI driver. +Remember that our end goal is to have an image host application that **scales horizontally** and has **persistent storage** backed by Amazon S3. In the previous steps we created a staging directory for our image objects, then we downloaded the image assets into the staging directory and uploaded them into our S3 bucket. Finally, we installed the Mountpoint for Amazon S3 CSI driver and added it to our environment. We now need to attach our pods to use this PV provided by the Mountpoint for Amazon S3 CSI driver. Let's create a [Persistent Volume](https://kubernetes.io/docs/concepts/storage/persistent-volumes/) and change the `assets` container on the assets deployment to mount the Volume created.