Skip to content

Commit 06d9d00

Browse files
authored
(DOCSP-36282) Changes cloudProviderAccess to cloudProviderIntegrations. (#19) (#26)
1 parent 6370e00 commit 06d9d00

File tree

3 files changed

+50
-19
lines changed

3 files changed

+50
-19
lines changed

source/ak8so-unified-access.txt

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
.. _ak8so-unified-access:
22

3-
====================================
4-
Set Up Unified Cloud Provider Access
5-
====================================
3+
==========================================
4+
Set Up Unified Cloud Provider Integrations
5+
==========================================
66

77
.. default-domain:: mongodb
88

@@ -30,14 +30,14 @@ Procedure
3030
.. procedure::
3131
:style: normal
3232

33-
.. step:: Add the ``spec.cloudProviderAccessRoles`` fields to the ``AtlasProject`` custom resource.
33+
.. step:: Add the ``spec.cloudProviderIntegrations`` fields to the ``AtlasProject`` custom resource.
3434

3535
a. Specify an empty value placeholder within the
36-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``
36+
:setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn`
3737
parameter of the :ref:`atlasproject-custom-resource`.
3838

3939
#. Specify ``AWS`` within the
40-
``spec.cloudProviderAccessRoles.providerName``
40+
:setting:`spec.cloudProviderIntegrations.providerName`
4141
parameter of the :ref:`atlasproject-custom-resource`.
4242

4343
**Example:**
@@ -57,7 +57,7 @@ Procedure
5757
projectIpAccessList:
5858
- ipAddress: "192.0.2.15"
5959
comment: "IP address for Application"
60-
cloudProviderAccessRoles:
60+
cloudProviderIntegrations:
6161
- providerName: "AWS"
6262
iamAssumedRoleArn: ""
6363
EOF
@@ -78,7 +78,7 @@ Procedure
7878
.. input::
7979
:language: sh
8080

81-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles.atlasAWSAccountArn.type}'
81+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations.atlasAWSAccountArn.type}'
8282

8383
.. output::
8484
:language: json
@@ -94,7 +94,7 @@ Procedure
9494
.. input::
9595
:language: sh
9696

97-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles.atlasAssumedRoleExternalId.type}'
97+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations.atlasAssumedRoleExternalId.type}'
9898

9999
.. output::
100100
:language: json
@@ -129,7 +129,7 @@ Procedure
129129
.. step:: Authorize the |iam| role's access using {+ak8so+}.
130130

131131
Replace the empty value placeholder within the
132-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``
132+
:setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn`
133133
parameter of the :ref:`atlasproject-custom-resource` with
134134
the |iam| role's |aws| |arn| from the previous step.
135135

@@ -150,25 +150,25 @@ Procedure
150150
projectIpAccessList:
151151
- ipAddress: "192.0.2.15"
152152
comment: "IP address for Application"
153-
cloudProviderAccessRoles:
153+
cloudProviderIntegrations:
154154
- providerName: "AWS"
155155
iamAssumedRoleArn: "arn:aws:iam::123456789012:role/aws-service-role/support.amazonaws.com/myRole"
156156
EOF
157157

158-
.. step:: Check the status of the ``cloudProviderAccessRole``.
158+
.. step:: Check the status of the ``cloudProviderIntegrations``.
159159

160160
a. Run the command to retrieve the status:
161161

162162
.. code-block:: sh
163163

164-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles}'
164+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations}'
165165

166166
#. Check for the ``READY`` status.
167167

168168
- If the status is ``CREATED``, |service| created the role but
169169
you have not authorized it within |aws|.
170170
- If the status is ``EMPTY_ARN``, |service| created the role
171171
but you have not specified the
172-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``.
172+
``spec.cloudProviderIntegrations.iamAssumedRoleArn``.
173173
- If the status is ``READY``, |service| has created the role
174174
and you have authorized it within |aws|.

source/atlasproject-custom-resource.txt

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1328,7 +1328,7 @@ This section describes the ``AtlasProject`` custom resource parameters:
13281328

13291329
*Type*: array
13301330

1331-
*Optional*
1331+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations` instead.
13321332

13331333
List that contains your :ref:`unified cloud provider access
13341334
<ak8so-unified-access>` settings.
@@ -1337,7 +1337,7 @@ This section describes the ``AtlasProject`` custom resource parameters:
13371337

13381338
*Type*: string
13391339

1340-
*Conditional*
1340+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn` instead.
13411341

13421342
Unique |aws| |arn| that identifies the |iam| access role that
13431343
|service| assumes. If you want to
@@ -1348,13 +1348,44 @@ This section describes the ``AtlasProject`` custom resource parameters:
13481348

13491349
*Type*: string
13501350

1351-
*Conditional*
1351+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations.providerName` instead.
13521352

13531353
Cloud provider for the access role that |service| assumes. |ak8so|
13541354
supports ``AWS`` for unified cloud provider access. If you want to
13551355
:ref:`set up unified cloud provider access
13561356
<ak8so-unified-access>`, you must specify this setting.
13571357

1358+
.. setting:: spec.cloudProviderIntegrations
1359+
1360+
*Type*: array
1361+
1362+
*Optional*
1363+
1364+
List that contains your :ref:`unified cloud provider integration
1365+
<ak8so-unified-access>` settings.
1366+
1367+
.. setting:: spec.cloudProviderIntegrations.iamAssumedRoleArn
1368+
1369+
*Type*: string
1370+
1371+
*Conditional*
1372+
1373+
Unique |aws| |arn| that identifies the |iam| access role that
1374+
|service| assumes. If you want to
1375+
:ref:`set up unified cloud provider integrations <ak8so-unified-access>`,
1376+
you must specify this setting.
1377+
1378+
.. setting:: spec.cloudProviderIntegrations.providerName
1379+
1380+
*Type*: string
1381+
1382+
*Conditional*
1383+
1384+
Cloud provider for the access role that |service| assumes. |ak8so|
1385+
supports ``AWS`` for unified cloud provider integrations. If you want to
1386+
:ref:`set up unified cloud provider integrations
1387+
<ak8so-unified-access>`, you must specify this setting.
1388+
13581389
.. setting:: spec.customRoles
13591390

13601391
*Type*: object

source/configure-ak8so-access-to-atlas.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ID and :ref:`API keys <about-org-api-keys>` from |ak8so|
1919
- :ref:`secret storage <ak8so-secret-storage>`.
2020
- :ref:`network peering <ak8so-network-peering>`.
2121
- :ref:`private endpoints <ak8so-private-endpoint>`.
22-
- :ref:`Unified Cloud Provider Access <ak8so-unified-access>`.
22+
- :ref:`Unified Cloud Provider Integrations <ak8so-unified-access>`.
2323
- :ref:`custom database roles <ak8so-configure-custom-database-roles>`.
2424
- :ref:`X.509 authentication <ak8so-x509>`
2525
- :ref:`Encryption at Rest <ak8so-ear>`.
@@ -157,7 +157,7 @@ steps.
157157
Secret Storage </ak8so-secret-storage>
158158
Network Peering </ak8so-network-peering>
159159
Private Endpoints </ak8so-private-link>
160-
Cloud Provider Access </ak8so-unified-access>
160+
Cloud Provider Integrations </ak8so-unified-access>
161161
Custom Database Roles </ak8so-configure-custom-database-roles>
162162
X.509 </ak8so-x509>
163163
Encrypt Data </ak8so-encryption-at-rest-customer-keys>

0 commit comments

Comments
 (0)