chore(kb/rds): improve readibility

This commit is contained in:
Michele Cereda
2024-08-02 18:06:41 +02:00
parent 4ffd24c89e
commit f00bb68256
2 changed files with 17 additions and 7 deletions

View File

@@ -108,6 +108,7 @@
"clamav", "clamav",
"clamd", "clamd",
"clamscan", "clamscan",
"clobs",
"cloudinit", "cloudinit",
"cloudquery", "cloudquery",
"cloudzero", "cloudzero",
@@ -139,11 +140,13 @@
"dnsmasq", "dnsmasq",
"dotfiles", "dotfiles",
"dpkg", "dpkg",
"dumpall",
"duperemove", "duperemove",
"eeprom", "eeprom",
"epel", "epel",
"essid", "essid",
"execve", "execve",
"extname",
"fallocate", "fallocate",
"fargate", "fargate",
"fastboot", "fastboot",
@@ -241,6 +244,7 @@
"pandoc", "pandoc",
"passwordless", "passwordless",
"pebcak", "pebcak",
"pgcrypto",
"photoprism", "photoprism",
"pihole", "pihole",
"pinentry", "pinentry",
@@ -264,6 +268,7 @@
"quickstart", "quickstart",
"radeon", "radeon",
"radicale", "radicale",
"rdsadmin",
"rego", "rego",
"replicatedctl", "replicatedctl",
"resolv", "resolv",
@@ -301,6 +306,7 @@
"sysctls", "sysctls",
"sysrc", "sysrc",
"systool", "systool",
"tablespace",
"taskfile", "taskfile",
"taskfiles", "taskfiles",
"tclsh", "tclsh",
@@ -321,6 +327,7 @@
"turris", "turris",
"twrp", "twrp",
"uncordon", "uncordon",
"unlogged",
"urandom", "urandom",
"userdata", "userdata",
"userdel", "userdel",
@@ -337,6 +344,7 @@
"wodle", "wodle",
"xattr", "xattr",
"xkcd", "xkcd",
"xlarge",
"yellowdog", "yellowdog",
"yubikey", "yubikey",
"zstd" "zstd"

View File

@@ -209,7 +209,7 @@ Automatic backups occur **daily** during the instances' backup window, configure
require more time than allotted to the backup window, they will continue after the window ends and until they finish. require more time than allotted to the backup window, they will continue after the window ends and until they finish.
Backups are retained for up to 35 days (_backup retention period_).<br/> Backups are retained for up to 35 days (_backup retention period_).<br/>
One can recover DB instances to any point in time from the backup retention period. One can recover DB instances to **any** point in time that sits inside the backup retention period.
The backup window can't overlap with the weekly maintenance window for DB instance or Multi-AZ DB cluster.<br/> The backup window can't overlap with the weekly maintenance window for DB instance or Multi-AZ DB cluster.<br/>
During automatic backup windows storage I/O might be suspended briefly while the backup process initializes. During automatic backup windows storage I/O might be suspended briefly while the backup process initializes.
@@ -223,11 +223,11 @@ are supposed to start.
DB instances must be in the `available` state for automated backups to occur.<br/> DB instances must be in the `available` state for automated backups to occur.<br/>
Automated backups don't occur while DB instances are in other states (i.e., `storage_full`). Automated backups don't occur while DB instances are in other states (i.e., `storage_full`).
Automated backups aren't created while a DB instance or cluster is stopped.<br/> Automated backups are **not** created while a DB instance or cluster is stopped.<br/>
RDS doesn't include time spent in the stopped state when the backup retention window is calculated. This means backups RDS does **not** include time spent in the stopped state when the backup retention window is calculated. This means that
can be retained longer than the backup retention period if a DB instance has been stopped. backups can be retained longer than the backup retention period if a DB instance has been stopped.
Automated backups don't occur while a DB snapshot copy is running in the same AWS Region for the same database. Automated backups will **not** occur while a DB snapshot copy is running in the same AWS Region for the same database.
### Manual backups ### Manual backups
@@ -376,7 +376,7 @@ aws rds restore-db-instance-from-db-snapshot \
RDS automatically integrates with AWS KMS for key management. RDS automatically integrates with AWS KMS for key management.
By default, RDS uses the RDS AWS managed key (`aws/rds`) for encryption.<br/> By default, RDS uses the _RDS AWS managed key_ (`aws/rds`) from KMS for encryption.<br/>
This key can't be managed, rotated, nor deleted by users. This key can't be managed, rotated, nor deleted by users.
RDS will automatically put databases into a terminal state when access to the KMS key is required but the key has been RDS will automatically put databases into a terminal state when access to the KMS key is required but the key has been
@@ -674,15 +674,17 @@ Actions involving altering protected roles or changing protected attributes are
Error message example: Error message example:
> ```plaintext
> Cannot execute SQL 'SELECT transport.import_from_server( > Cannot execute SQL 'SELECT transport.import_from_server(
> 'source.ab0123456789.eu-west-1.rds.amazonaws.com', > 'source.ab0123456789.eu-west-1.rds.amazonaws.com',
> 5432, > 5432,
> 'masta', > 'mastarr',
> '********', > '********',
> 'sales', > 'sales',
> '********', > '********',
> true > true
> );' None: remote user must have superuser (or rds_superuser if on RDS) > );' None: remote user must have superuser (or rds_superuser if on RDS)
> ```
_Speculative_ root cause: RDS did not finish to properly apply the settings. _Speculative_ root cause: RDS did not finish to properly apply the settings.