Minor cosmetic markdown tweaks in docs/cloudwatch.md (#29238)

Changed a couple codeblock types, and reformatted one yaml block to use two-spaces instead of tabs.
This commit is contained in:
Vitaliy 2020-11-19 12:04:22 -05:00 committed by GitHub
parent 281465c421
commit 2dc260a486
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -55,7 +55,7 @@ utilize Grafana's built-in support for assuming roles.
Here is a minimal policy example:
```bash
```json
{
"Version": "2012-10-17",
"Statement": [
@ -109,11 +109,11 @@ The `Assume Role ARN` field allows you to specify which IAM role to assume, if a
The Grafana process in the container runs as user 472 (called "grafana"). When Kubernetes mounts your projected credentials, they will by default only be available to the root user. In order to allow user 472 to access the credentials (and avoid it falling back to the IAM role attached to the EC2 instance), you will need to provide a [security context](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) for your pod.
```
```yaml
securityContext:
fsGroup: 472
runAsUser: 472
runAsGroup: 472
fsGroup: 472
runAsUser: 472
runAsGroup: 472
```
### AWS credentials file
@ -347,7 +347,7 @@ Some queries accept filters in JSON format and Grafana supports the conversion o
If `env = 'production', 'staging'`, following query will return ARNs of EC2 instances which `Environment` tag is `production` or `staging`.
```
```javascript
resource_arns(us-east-1, ec2:instance, {"Environment":${env:json}})
```