Reverted variables.tf metadata.yaml README.md to commit 85407109c8

This commit is contained in:
Alejandro Leal 2023-05-15 16:45:13 -04:00
parent 65e6ef98fa
commit 11f7f3efed
4 changed files with 5 additions and 5 deletions

View File

@ -188,7 +188,7 @@ variable "vpc_sc_access_levels" {
}
variable "vpc_sc_egress_policies" {
description = "VPC SC egress policy definitions."
description = "VPC SC egress policy defnitions."
type = map(object({
from = object({
identity_type = optional(string, "ANY_IDENTITY")
@ -208,7 +208,7 @@ variable "vpc_sc_egress_policies" {
}
variable "vpc_sc_ingress_policies" {
description = "VPC SC ingress policy definitions."
description = "VPC SC ingress policy defnitions."
type = map(object({
from = object({
access_levels = optional(list(string), [])

View File

@ -36,7 +36,7 @@ Assign roles relying on User groups is a way to decouple the final set of permis
We use the following groups to control access to resources:
- *Data Scientist* (gcp-ml-ds@<company.org>). They manage notebooks and create ML pipelines.
- *Data Scientits* (gcp-ml-ds@<company.org>). They manage notebooks and create ML pipelines.
- *ML Engineers* (gcp-ml-eng@<company.org>). They manage the different Vertex resources.
- *ML Viewer* (gcp-ml-eng@<company.org>). Group with wiewer permission for the different resources.

View File

@ -50,7 +50,7 @@ spec:
interfaces:
variables:
- name: notebooks
description: Vertex AI workbenches to be deployed. Service Account runtime/instances deployed.
description: Vertex AI workbenchs to be deployed. Service Account runtime/instances deployed.
type: |-
map(object({
type = string

View File

@ -67,7 +67,7 @@ variable "network_config" {
}
variable "notebooks" {
description = "Vertex AI workbenches to be deployed. Service Account runtime/instances deployed."
description = "Vertex AI workbenchs to be deployed. Service Account runtime/instances deployed."
type = map(object({
type = string
machine_type = optional(string, "n1-standard-4")