Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Empty file modified getting-started/assets/cloud_providers/deploy-aws.sh
100644 → 100755
Empty file.
Empty file modified getting-started/assets/cloud_providers/deploy-azure.sh
100644 → 100755
Empty file.
Empty file modified getting-started/assets/cloud_providers/deploy-gcp.sh
100644 → 100755
Empty file.
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,6 @@ The requirements to run the script below are:
* "sts:AssumeRole" on the same role as the Instance Profile role of the EC2 instance on which you are running this script. Additionally, you should ensure that the Instance Profile contains a trust policy that allows the role to trust itself to be assumed.

```shell
chmod +x getting-started/assets/cloud_providers/deploy-aws.sh
export ASSETS_PATH=$(pwd)/getting-started/assets/
export CLIENT_ID=root
export CLIENT_SECRET=s3cr3t
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ The requirements to run the script below are:
* Assign a System-Assigned Managed Identity to the Azure VM.

```shell
chmod +x getting-started/assets/cloud_providers/deploy-azure.sh
export ASSETS_PATH=$(pwd)/getting-started/assets/
export CLIENT_ID=root
export CLIENT_SECRET=s3cr3t
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ The requirements to run the script below are:
* Ensure the VM's Principal has access to at least Read-only scope on Compute Engine: `compute.readonly`.

```shell
chmod +x getting-started/assets/cloud_providers/deploy-gcp.sh
export ASSETS_PATH=$(pwd)/getting-started/assets/
export CLIENT_ID=root
export CLIENT_SECRET=s3cr3t
Expand Down