Skip to content

Commit 7d2902c

Browse files
committed
remove YOUR_
1 parent e1c5790 commit 7d2902c

File tree

40 files changed

+227
-228
lines changed

40 files changed

+227
-228
lines changed

contributing/development-setup.md

+52-53
Original file line numberDiff line numberDiff line change
@@ -130,117 +130,116 @@ You must also configure the following environment variables before running the t
130130
##### MongoDB Atlas env variables
131131
- Required env variables:
132132
```bash
133-
export MONGODB_ATLAS_PROJECT_ID=<YOUR_PROJECT_ID>
134-
export MONGODB_ATLAS_ORG_ID=<YOUR_ORG_ID>
135-
export MONGODB_ATLAS_PUBLIC_KEY=<YOUR_PUBLIC_KEY>
136-
export MONGODB_ATLAS_PRIVATE_KEY=<YOUR_PRIVATE_KEY>
133+
export MONGODB_ATLAS_PUBLIC_KEY=<ATLAS_PUBLIC_KEY>
134+
export MONGODB_ATLAS_PRIVATE_KEY=<ATLAS_PRIVATE_KEY>
135+
export MONGODB_ATLAS_ORG_ID=<ATLAS_ORG_ID>
136+
export MONGODB_ATLAS_PROJECT_ID=<ATLAS_PROJECT_ID>
137137

138138
# This env variable is optional and allow you to run terraform with a custom server
139139
export MONGODB_ATLAS_BASE_URL=<CUSTOM_SERVER_URL>
140140
```
141141

142142
- For `Authentication database user` resource configuration:
143143
```bash
144-
export MONGODB_ATLAS_DB_USERNAME=<YOUR_DATABASE_NAME>
144+
export MONGODB_ATLAS_DB_USERNAME=<ATLAS_DATABASE_NAME>
145145
```
146146

147147
- For `Project(s)` resource configuration:
148148
```bash
149-
export MONGODB_ATLAS_TEAMS_IDS=<YOUR_TEAMS_IDS>
149+
export MONGODB_ATLAS_TEAMS_IDS=<ATLAS_TEAMS_IDS>
150150
```
151151
~> **Notice:** It should be at least one team id up to 3 teams ids depending of acceptance testing using separator comma like this `teamId1,teamdId2,teamId3`.
152152

153153
- For `Federated Settings` resource configuration:
154154
```bash
155-
export MONGODB_ATLAS_FEDERATION_SETTINGS_ID=<YOUR_FEDERATION_SETTINGS_ID>
156-
export MONGODB_ATLAS_FEDERATED_ORG_ID=<YOUR_FEDERATED_ORG_ID>
157-
export MONGODB_ATLAS_FEDERATED_GROUP_ID=<YOUR_FEDERATED_GROUP_ID>
158-
export MONGODB_ATLAS_FEDERATED_ROLE_MAPPING_ID=<YOUR_FEDERATED_ROLE_MAPPING_ID>
159-
export MONGODB_ATLAS_FEDERATED_OKTA_IDP_ID=<YOUR_FEDERATED_OKTA_IDP_ID>
160-
export MONGODB_ATLAS_FEDERATED_SSO_URL=<YOUR_FEDERATED_SSO_URL>
161-
export MONGODB_ATLAS_FEDERATED_ISSUER_URI=<YOUR_FEDERATED_ISSUER_URI>
155+
export MONGODB_ATLAS_FEDERATION_SETTINGS_ID=<ATLAS_FEDERATION_SETTINGS_ID>
156+
export MONGODB_ATLAS_FEDERATED_ORG_ID=<ATLAS_FEDERATED_ORG_ID>
157+
export MONGODB_ATLAS_FEDERATED_GROUP_ID=<ATLAS_FEDERATED_GROUP_ID>
158+
export MONGODB_ATLAS_FEDERATED_ROLE_MAPPING_ID=<ATLAS_FEDERATED_ROLE_MAPPING_ID>
159+
export MONGODB_ATLAS_FEDERATED_OKTA_IDP_ID=<ATLAS_FEDERATED_OKTA_IDP_ID>
160+
export MONGODB_ATLAS_FEDERATED_SSO_URL=<ATLAS_FEDERATED_SSO_URL>
161+
export MONGODB_ATLAS_FEDERATED_ISSUER_URI=<ATLAS_FEDERATED_ISSUER_URI>
162162
```
163163
~> **Notice:** For more information about the Federation configuration resource, see: https://www.mongodb.com/docs/atlas/reference/api/federation-configuration/
164164

165165
##### AWS env variables
166166

167167
- For `Network Peering` resource configuration:
168168
```bash
169-
export AWS_ACCOUNT_ID=<YOUR_ACCOUNT_ID>
170-
export AWS_VPC_ID=<YOUR_VPC_ID>
171-
export AWS_VPC_CIDR_BLOCK=<YOUR_VPC_CIDR_BLOCK>
172-
export AWS_REGION=<YOUR_REGION>
173-
export AWS_SUBNET_ID=<YOUR_SUBNET_ID>
174-
export AWS_SECURITY_GROUP_ID=<YOUR_SECURITY_GROUP_ID>
169+
export AWS_ACCOUNT_ID=<AWS_ACCOUNT_ID>
170+
export AWS_VPC_ID=<AWS_VPC_ID>
171+
export AWS_VPC_CIDR_BLOCK=<AWS_VPC_CIDR_BLOCK>
172+
export AWS_REGION=<AWS_REGION>
173+
export AWS_SUBNET_ID=<AWS_SUBNET_ID>
174+
export AWS_SECURITY_GROUP_ID=<AWS_SECURITY_GROUP_ID>
175175
```
176176
~> **Notice:** For more information about the Network Peering resource, see: https://docs.atlas.mongodb.com/reference/api/vpc/
177177

178178
- For `Encryption at Rest` resource configuration:
179179
```bash
180-
export AWS_ACCESS_KEY_ID=<YOUR_AWS_ACCESS_KEY_ID>
181-
export AWS_SECRET_ACCESS_KEY=<YOUR_AWS_SECRET_ACCESS_KEY>
182-
export AWS_CUSTOMER_MASTER_KEY_ID=<YOUR_AWS_CUSTOMER_MASTER_KEY_ID>
183-
export AWS_REGION=<YOUR_AWS_REGION>
184-
185-
export AWS_ACCESS_KEY_ID_UPDATED=<YOUR_AWS_ACCESS_KEY_ID_UPDATED>
186-
export AWS_SECRET_ACCESS_KEY_UPDATED=<YOUR_AWS_SECRET_ACCESS_KEY_UPDATED>
187-
export AWS_CUSTOMER_MASTER_KEY_ID_UPDATED=<YOUR_AWS_CUSTOMER_MASTER_KEY_ID_UPDATED>
188-
export AWS_REGION_UPDATED=<YOUR_AWS_REGION_UPDATED>
180+
export AWS_ACCESS_KEY_ID=<AWS_ACCESS_KEY_ID>
181+
export AWS_SECRET_ACCESS_KEY=<AWS_SECRET_ACCESS_KEY>
182+
export AWS_CUSTOMER_MASTER_KEY_ID=<AWS_CUSTOMER_MASTER_KEY_ID>
183+
export AWS_REGION=<AWS_REGION>
184+
185+
export AWS_ACCESS_KEY_ID_UPDATED=<AWS_ACCESS_KEY_ID_UPDATED>
186+
export AWS_SECRET_ACCESS_KEY_UPDATED=<AWS_SECRET_ACCESS_KEY_UPDATED>
187+
export AWS_CUSTOMER_MASTER_KEY_ID_UPDATED=<AWS_CUSTOMER_MASTER_KEY_ID_UPDATED>
188+
export AWS_REGION_UPDATED=<AWS_REGION_UPDATED>
189189
```
190190
~> **Notice:** For more information about the Encryption at Rest resource, see: https://docs.atlas.mongodb.com/reference/api/encryption-at-rest/
191191

192192
- For `Private Endpoint Link` resource configuration:
193193
```bash
194-
export AWS_ACCESS_KEY_ID=<YOUR_AWS_ACCESS_KEY_ID>
195-
export AWS_SECRET_ACCESS_KEY=<YOUR_AWS_SECRET_ACCESS_KEY>
196-
export AWS_CUSTOMER_MASTER_KEY_ID=<YOUR_AWS_CUSTOMER_MASTER_KEY_ID>
197-
export AWS_REGION=<YOUR_AWS_REGION>
198-
export AWS_VPC_ID=<YOUR_AWS_VPC_ID>
199-
export AWS_SUBNET_ID=<YOUR_AWS_SUBNET_ID>
200-
export AWS_SECURITY_GROUP_ID=<YOUR_AWS_SECURITY_GROUP_ID>
194+
export AWS_ACCESS_KEY_ID=<AWS_ACCESS_KEY_ID>
195+
export AWS_SECRET_ACCESS_KEY=<AWS_SECRET_ACCESS_KEY>
196+
export AWS_CUSTOMER_MASTER_KEY_ID=<AWS_CUSTOMER_MASTER_KEY_ID>
197+
export AWS_REGION=<AWS_REGION>
198+
export AWS_VPC_ID=<AWS_VPC_ID>
199+
export AWS_SUBNET_ID=<AWS_SUBNET_ID>
200+
export AWS_SECURITY_GROUP_ID=<AWS_SECURITY_GROUP_ID>
201201
```
202202
~> **Notice:** For more information about the PrivateLink (for AWS only), see: https://docs.atlas.mongodb.com/reference/api/encryption-at-rest/https://docs.atlas.mongodb.com/reference/api/private-endpoint/
203203

204204
##### AZURE env variables
205205

206206
- For `Network Peering` resource configuration:
207207
```bash
208-
export AZURE_DIRECTORY_ID=<YOUR_DIRECTORY_ID>
209-
export AZURE_SUBSCRIPTION_ID=<YOUR_SUBSCRIPTION_ID>
210-
export AZURE_RESOURCE_GROUP_NAME=<YOUR_RESOURCE_GROUP_NAME>
211-
export AZURE_VNET_NAME=<YOUR_VNET_NAME>
208+
export AZURE_DIRECTORY_ID=<AZURE_DIRECTORY_ID>
209+
export AZURE_SUBSCRIPTION_ID=<AZURE_SUBSCRIPTION_ID>
210+
export AZURE_RESOURCE_GROUP_NAME=<AZURE_RESOURCE_GROUP_NAME>
211+
export AZURE_VNET_NAME=<AZURE_VNET_NAME>
212212
```
213213
~> **Notice:** For more information about the Network Peering resource, see: https://docs.atlas.mongodb.com/reference/api/vpc/
214214

215215

216216
- For Encryption at Rest resource configuration:
217217
```bash
218-
export AZURE_CLIENT_ID=<YOUR_CLIENT_ID>
219-
export AZURE_SUBSCRIPTION_ID=<YOUR_SUBSCRIPTION_ID>
220-
export AZURE_RESOURCE_GROUP_NAME=<YOUR_RESOURCE_GROUP_NAME>
221-
export AZURE_APP_SECRET=<YOUR_SECRET>
222-
export AZURE_KEY_VAULT_NAME=<YOUR_KEY_VAULT_NAME>
223-
export AZURE_KEY_IDENTIFIER=<YOUR_KEY_IDENTIFIER>
224-
export AZURE_TENANT_ID=<YOUR_TENANT_ID>
225-
export AZURE_DIRECTORY_ID=<YOUR_DIRECTORY_ID>
226-
227-
export AZURE_KEY_VAULT_NAME_UPDATED=<YOUR_KEY_VAULT_NAME_UPDATED>
228-
export AZURE_KEY_IDENTIFIER_UPDATED=<YOUR_KEY_IDENTIFIER_UPDATED>
218+
export AZURE_CLIENT_ID=<AZURE_CLIENT_ID>
219+
export AZURE_SUBSCRIPTION_ID=<AZURE_SUBSCRIPTION_ID>
220+
export AZURE_RESOURCE_GROUP_NAME=<AZURE_RESOURCE_GROUP_NAME>
221+
export AZURE_APP_SECRET=<AZURE_APP_SECRET>
222+
export AZURE_KEY_VAULT_NAME=<AZURE_KEY_VAULT_NAME>
223+
export AZURE_KEY_IDENTIFIER=<AZURE_KEY_IDENTIFIER>
224+
export AZURE_TENANT_ID=<AZURE_TENANT_ID>
225+
export AZURE_DIRECTORY_ID=<AZURE_DIRECTORY_ID>
226+
export AZURE_KEY_VAULT_NAME_UPDATED=<AZURE_KEY_VAULT_NAME_UPDATED>
227+
export AZURE_KEY_IDENTIFIER_UPDATED=<AZURE_KEY_IDENTIFIER_UPDATED>
229228
```
230229
~> **Notice:** For more information about the Encryption at Rest resource, see: https://docs.atlas.mongodb.com/reference/api/encryption-at-rest/
231230

232231
##### GCP env variables
233232
- For `Network Peering` resource configuration:
234233
```bash
235-
$export GCP_PROJECT_ID=<YOUR_PROJECT_ID>
234+
$export GCP_PROJECT_ID=<GCP_PROJECT_ID>
236235
```
237236
~> **Notice:** For more information about the Network Peering resource, see: https://docs.atlas.mongodb.com/reference/api/vpc/
238237

239238

240239
- For Encryption at Rest resource configuration:
241240
```bash
242-
export GCP_SERVICE_ACCOUNT_KEY=<YOUR_GCP_SERVICE_ACCOUNT_KEY>
243-
export GCP_KEY_VERSION_RESOURCE_ID=<YOUR_GCP_KEY_VERSION_RESOURCE_ID>
241+
export GCP_SERVICE_ACCOUNT_KEY=<GCP_SERVICE_ACCOUNT_KEY>
242+
export GCP_KEY_VERSION_RESOURCE_ID=<GCP_KEY_VERSION_RESOURCE_ID>
244243
```
245244
~> **Notice:** For more information about the Encryption at Rest resource, see: https://docs.atlas.mongodb.com/reference/api/encryption-at-rest/
246245

docs/guides/0.9.1-upgrade-guide.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ resource "mongodbatlas_cloud_provider_access_authorization" "auth" {
3535
role_id = mongodbatlas_cloud_provider_access_setup.unique.role_id
3636
3737
aws = {
38-
iam_assumed_role_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:role/test-user-role"
38+
iam_assumed_role_arn = "arn:aws:iam::<AWS_ACCOUNT_ID>:role/test-user-role"
3939
}
4040
}
4141
```

docs/index.md

+12-12
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,8 @@ provider "mongodbatlas" {}
5959
Usage (prefix the export commands with a space to avoid the keys being recorded in OS history):
6060

6161
```shell
62-
$ export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
63-
$ export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
62+
$ export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
63+
$ export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
6464
$ terraform plan
6565
```
6666

@@ -102,34 +102,34 @@ Note: this policy may be overly broad for many use cases, feel free to adjust ac
102102

103103
3. In terminal, store as environmental variables AWS API Keys (while you can also hardcode in config files these will then be stored as plain text in .tfstate file and should be avoided if possible). For example:
104104
```
105-
export AWS_ACCESS_KEY_ID='<YOUR_AWS_KEY_ID>'
106-
export AWS_SECRET_ACCESS_KEY='<YOUR_AWS_SECRET_ACCESS_KEY>'
105+
export AWS_ACCESS_KEY_ID='<AWS_KEY_ID>'
106+
export AWS_SECRET_ACCESS_KEY='<AWS_SECRET_ACCESS_KEY>'
107107
```
108108
4. In terminal, use the AWS CLI command: `aws sts assume-role --role-arn ROLE_ARN_FROM_ABOVE --role-session-name newSession`
109109

110110
Note: AWS STS secrets are short lived by default, use the ` --duration-seconds` flag to specify longer duration as needed
111111

112112
5. Store each of the 3 new created secrets from AWS STS as environment variables (hardcoding secrets into config file with additional risk is also supported). For example:
113113
```
114-
export AWS_ACCESS_KEY_ID='<YOUR_AWS_KEY_ID>'
115-
export AWS_SECRET_ACCESS_KEY='<YOUR_AWS_SECRET_ACCESS_KEY>'
116-
export AWS_SESSION_TOKEN="<YOUR_AWS_SESSION_TOKEN>"
114+
export AWS_ACCESS_KEY_ID='<AWS_KEY_ID>'
115+
export AWS_SECRET_ACCESS_KEY='<AWS_SECRET_ACCESS_KEY>'
116+
export AWS_SESSION_TOKEN="<AWS_SESSION_TOKEN>"
117117
```
118118

119119
6. Add assume_role block with `role_arn`, `secret_name`, and AWS `region` where secret is stored as part of AWS SM. Each of these 3 fields are REQUIRED. For example:
120120
```terraform
121121
# Configure the MongoDB Atlas Provider to Authenticate with AWS Secrets Manager
122122
provider "mongodbatlas" {
123123
assume_role {
124-
role_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:role/mdbsts"
124+
role_arn = "arn:aws:iam::<AWS_ACCOUNT_ID>:role/mdbsts"
125125
}
126126
secret_name = "mongodbsecret"
127-
// fully qualified secret_name ARN also supported as input "arn:aws:secretsmanager:af-south-1:<YOUR_ACCOUNT_ID>:secret:test789-TO06Hy"
127+
// fully qualified secret_name ARN also supported as input "arn:aws:secretsmanager:af-south-1:<AWS_ACCOUNT_ID>:secret:test789-TO06Hy"
128128
region = "us-east-2"
129129
130-
aws_access_key_id = "<YOUR_AWS_ACCESS_KEY_ID>"
131-
aws_secret_access_key = "<YOUR_AWS_SECRET_ACCESS_KEY>"
132-
aws_session_token = "<YOUR_AWS_SESSION_TOKEN>"
130+
aws_access_key_id = "<AWS_ACCESS_KEY_ID>"
131+
aws_secret_access_key = "<AWS_SECRET_ACCESS_KEY>"
132+
aws_session_token = "<AWS_SESSION_TOKEN>"
133133
sts_endpoint = "https://sts.us-east-2.amazonaws.com/"
134134
}
135135
```

docs/resources/cloud_provider_access.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ resource "mongodbatlas_cloud_provider_access_authorization" "auth_role" {
9393
role_id = mongodbatlas_cloud_provider_access_setup.setup_only.role_id
9494
9595
aws {
96-
iam_assumed_role_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:role/test-user-role"
96+
iam_assumed_role_arn = "arn:aws:iam::<AWS_ACCOUNT_ID>:role/test-user-role"
9797
}
9898
}
9999

docs/resources/stream_connection.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ resource "mongodbatlas_stream_connection" "test" {
7575
connection_name = "AWSLambdaConnection"
7676
type = "AWSLambda"
7777
aws = {
78-
role_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:role/lambdaRole"
78+
role_arn = "arn:aws:iam::<AWS_ACCOUNT_ID>:role/lambdaRole"
7979
}
8080
}
8181

examples/migrate_cluster_to_advanced_cluster/module_user/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ The rest of this example is a step by step guide on how to migrate from `mongodb
3232
- Configure the provider (can also be done by configuring `public_key` and `private_key` in a `provider.tfvars`).
3333

3434
```bash
35-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
36-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
35+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
36+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
3737
```
3838

3939
## Step 1: Create the `mongodbatlas_cluster` with `v1` of the module

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/asymmetric-sharded-cluster/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Terraform >= 0.13
2323
This can be done using environment variables:
2424

2525
```bash
26-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
27-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
26+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
27+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2828
```
2929

3030
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/auto-scaling-per-shard/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Terraform >= 0.13
2323
This can be done using environment variables:
2424

2525
```bash
26-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
27-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
26+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
27+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2828
```
2929

3030
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/flex-upgrade/README.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ Utilize the following to execute a working example, replacing the org id, public
2020

2121
Apply with the following `terraform.tfvars` to first create a free tier cluster:
2222
```
23-
atlas_org_id = <YOUR_ORG_ID>
24-
public_key = <YOUR_ATLAS_PUBLIC_KEY>
25-
private_key = <YOUR_ATLAS_PRIVATE_KEY>
23+
atlas_org_id = <ATLAS_ORG_ID>
24+
public_key = <ATLAS_PUBLIC_KEY>
25+
private_key = <ATLAS_PRIVATE_KEY>
2626
provider_name = "TENANT"
2727
backing_provider_name = "AWS"
2828
provider_instance_size_name = "M0"
@@ -63,9 +63,9 @@ resource "mongodbatlas_advanced_cluster" "cluster" {
6363

6464
Apply with the following `terraform.tfvars` to upgrade the free tier cluster you just created to flex tier:
6565
```
66-
atlas_org_id = <YOUR_ORG_ID>
67-
public_key = <YOUR_ATLAS_PUBLIC_KEY>
68-
private_key = <YOUR_ATLAS_PRIVATE_KEY>
66+
atlas_org_id = <ATLAS_ORG_ID>
67+
public_key = <ATLAS_PUBLIC_KEY>
68+
private_key = <ATLAS_PRIVATE_KEY>
6969
provider_name = "FLEX"
7070
backing_provider_name = "AWS"
7171
provider_instance_size_name = null
@@ -106,9 +106,9 @@ resource "mongodbatlas_advanced_cluster" "cluster" {
106106

107107
Apply with the following `terraform.tfvars` to upgrade the flex tier cluster you just created to dedicated tier:
108108
```
109-
atlas_org_id = <YOUR_ORG_ID>
110-
public_key = <YOUR_ATLAS_PUBLIC_KEY>
111-
private_key = <YOUR_ATLAS_PRIVATE_KEY>
109+
atlas_org_id = <ATLAS_ORG_ID>
110+
public_key = <ATLAS_PUBLIC_KEY>
111+
private_key = <ATLAS_PRIVATE_KEY>
112112
provider_name = "AWS"
113113
backing_provider_name = null
114114
provider_instance_size_name = "M10"

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/global-cluster/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Terraform >= 0.13
2323
This can be done using environment variables:
2424

2525
```bash
26-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
27-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
26+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
27+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2828
```
2929

3030
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/multi-cloud/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ Terraform >= 0.13
2424
This can be done using environment variables:
2525

2626
```bash
27-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
28-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
27+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
28+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2929
```
3030

3131
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

examples/mongodbatlas_advanced_cluster (preview provider 2.0.0)/tenant-upgrade/README.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,18 @@ Utilize the following to execute a working example, replacing the org id, public
2020

2121
Apply with the following `terraform.tfvars` to first create a shared tier cluster:
2222
```
23-
atlas_org_id = <YOUR_ORG_ID>
24-
public_key = <YOUR_ATLAS_PUBLIC_KEY>
25-
private_key = <YOUR_ATLAS_PRIVATE_KEY>
23+
atlas_org_id = <ATLAS_ORG_ID>
24+
public_key = <ATLAS_PUBLIC_KEY>
25+
private_key = <ATLAS_PRIVATE_KEY>
2626
provider_name = "TENANT"
2727
backing_provider_name = "AWS"
2828
provider_instance_size_name = "M0"
2929
```
3030

3131
Apply with the following `terraform.tfvars` to upgrade the shared tier cluster you just created to dedicated tier:
3232
```
33-
atlas_org_id = <YOUR_ORG_ID>
34-
public_key = <YOUR_ATLAS_PUBLIC_KEY>
35-
private_key = <YOUR_ATLAS_PRIVATE_KEY>
33+
atlas_org_id = <ATLAS_ORG_ID>
34+
public_key = <ATLAS_PUBLIC_KEY>
35+
private_key = <ATLAS_PRIVATE_KEY>
3636
provider_name = "AWS"
3737
provider_instance_size_name = "M10"

examples/mongodbatlas_advanced_cluster/asymmetric-sharded-cluster/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ Terraform >= 0.13
1919
This can be done using environment variables:
2020

2121
```bash
22-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
23-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
22+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
23+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2424
```
2525

2626
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

examples/mongodbatlas_advanced_cluster/auto-scaling-per-shard/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ Terraform >= 0.13
2020
This can be done using environment variables:
2121

2222
```bash
23-
export MONGODB_ATLAS_PUBLIC_KEY="<YOUR_ATLAS_PUBLIC_KEY>"
24-
export MONGODB_ATLAS_PRIVATE_KEY="<YOUR_ATLAS_PRIVATE_KEY>"
23+
export MONGODB_ATLAS_PUBLIC_KEY="<ATLAS_PUBLIC_KEY>"
24+
export MONGODB_ATLAS_PRIVATE_KEY="<ATLAS_PRIVATE_KEY>"
2525
```
2626

2727
... or follow as in the `variables.tf` file and create **terraform.tfvars** file with all the variable values, ex:

0 commit comments

Comments
 (0)