Skip to content

Commit 2f72b45

Browse files
authored
(DOCSP-36282) Changes cloudProviderAccess to cloudProviderIntegrations. (#19) (#25)
1 parent f7e9941 commit 2f72b45

File tree

3 files changed

+50
-19
lines changed

3 files changed

+50
-19
lines changed

source/ak8so-unified-access.txt

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
.. _ak8so-unified-access:
22

3-
====================================
4-
Set Up Unified Cloud Provider Access
5-
====================================
3+
==========================================
4+
Set Up Unified Cloud Provider Integrations
5+
==========================================
66

77
.. default-domain:: mongodb
88

@@ -30,14 +30,14 @@ Procedure
3030
.. procedure::
3131
:style: normal
3232

33-
.. step:: Add the ``spec.cloudProviderAccessRoles`` fields to the ``AtlasProject`` custom resource.
33+
.. step:: Add the ``spec.cloudProviderIntegrations`` fields to the ``AtlasProject`` custom resource.
3434

3535
a. Specify an empty value placeholder within the
36-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``
36+
:setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn`
3737
parameter of the :ref:`atlasproject-custom-resource`.
3838

3939
#. Specify ``AWS`` within the
40-
``spec.cloudProviderAccessRoles.providerName``
40+
:setting:`spec.cloudProviderIntegrations.providerName`
4141
parameter of the :ref:`atlasproject-custom-resource`.
4242

4343
**Example:**
@@ -57,7 +57,7 @@ Procedure
5757
projectIpAccessList:
5858
- ipAddress: "192.0.2.15"
5959
comment: "IP address for Application"
60-
cloudProviderAccessRoles:
60+
cloudProviderIntegrations:
6161
- providerName: "AWS"
6262
iamAssumedRoleArn: ""
6363
EOF
@@ -78,7 +78,7 @@ Procedure
7878
.. input::
7979
:language: sh
8080

81-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles.atlasAWSAccountArn.type}'
81+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations.atlasAWSAccountArn.type}'
8282

8383
.. output::
8484
:language: json
@@ -94,7 +94,7 @@ Procedure
9494
.. input::
9595
:language: sh
9696

97-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles.atlasAssumedRoleExternalId.type}'
97+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations.atlasAssumedRoleExternalId.type}'
9898

9999
.. output::
100100
:language: json
@@ -129,7 +129,7 @@ Procedure
129129
.. step:: Authorize the |iam| role's access using {+ak8so+}.
130130

131131
Replace the empty value placeholder within the
132-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``
132+
:setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn`
133133
parameter of the :ref:`atlasproject-custom-resource` with
134134
the |iam| role's |aws| |arn| from the previous step.
135135

@@ -150,25 +150,25 @@ Procedure
150150
projectIpAccessList:
151151
- ipAddress: "192.0.2.15"
152152
comment: "IP address for Application"
153-
cloudProviderAccessRoles:
153+
cloudProviderIntegrations:
154154
- providerName: "AWS"
155155
iamAssumedRoleArn: "arn:aws:iam::123456789012:role/aws-service-role/support.amazonaws.com/myRole"
156156
EOF
157157

158-
.. step:: Check the status of the ``cloudProviderAccessRole``.
158+
.. step:: Check the status of the ``cloudProviderIntegrations``.
159159

160160
a. Run the command to retrieve the status:
161161

162162
.. code-block:: sh
163163

164-
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles}'
164+
kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations}'
165165

166166
#. Check for the ``READY`` status.
167167

168168
- If the status is ``CREATED``, |service| created the role but
169169
you have not authorized it within |aws|.
170170
- If the status is ``EMPTY_ARN``, |service| created the role
171171
but you have not specified the
172-
``spec.cloudProviderAccessRoles.iamAssumedRoleArn``.
172+
``spec.cloudProviderIntegrations.iamAssumedRoleArn``.
173173
- If the status is ``READY``, |service| has created the role
174174
and you have authorized it within |aws|.

source/atlasproject-custom-resource.txt

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1159,7 +1159,7 @@ This section describes the ``AtlasProject`` custom resource parameters:
11591159

11601160
*Type*: array
11611161

1162-
*Optional*
1162+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations` instead.
11631163

11641164
List that contains your :ref:`unified cloud provider access
11651165
<ak8so-unified-access>` settings.
@@ -1168,7 +1168,7 @@ This section describes the ``AtlasProject`` custom resource parameters:
11681168

11691169
*Type*: string
11701170

1171-
*Conditional*
1171+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations.iamAssumedRoleArn` instead.
11721172

11731173
Unique |aws| |arn| that identifies the |iam| access role that
11741174
|service| assumes. If you want to
@@ -1179,13 +1179,44 @@ This section describes the ``AtlasProject`` custom resource parameters:
11791179

11801180
*Type*: string
11811181

1182-
*Conditional*
1182+
*Deprecated*. Use :setting:`spec.cloudProviderIntegrations.providerName` instead.
11831183

11841184
Cloud provider for the access role that |service| assumes. |ak8so|
11851185
supports ``AWS`` for unified cloud provider access. If you want to
11861186
:ref:`set up unified cloud provider access
11871187
<ak8so-unified-access>`, you must specify this setting.
11881188

1189+
.. setting:: spec.cloudProviderIntegrations
1190+
1191+
*Type*: array
1192+
1193+
*Optional*
1194+
1195+
List that contains your :ref:`unified cloud provider integration
1196+
<ak8so-unified-access>` settings.
1197+
1198+
.. setting:: spec.cloudProviderIntegrations.iamAssumedRoleArn
1199+
1200+
*Type*: string
1201+
1202+
*Conditional*
1203+
1204+
Unique |aws| |arn| that identifies the |iam| access role that
1205+
|service| assumes. If you want to
1206+
:ref:`set up unified cloud provider integrations <ak8so-unified-access>`,
1207+
you must specify this setting.
1208+
1209+
.. setting:: spec.cloudProviderIntegrations.providerName
1210+
1211+
*Type*: string
1212+
1213+
*Conditional*
1214+
1215+
Cloud provider for the access role that |service| assumes. |ak8so|
1216+
supports ``AWS`` for unified cloud provider integrations. If you want to
1217+
:ref:`set up unified cloud provider integrations
1218+
<ak8so-unified-access>`, you must specify this setting.
1219+
11891220
.. setting:: spec.customRoles
11901221

11911222
*Type*: object

source/configure-ak8so-access-to-atlas.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ID and :ref:`API keys <about-org-api-keys>` from |ak8so|
1919
- :ref:`secret storage <ak8so-secret-storage>`.
2020
- :ref:`network peering <ak8so-network-peering>`.
2121
- :ref:`private endpoints <ak8so-private-endpoint>`.
22-
- :ref:`Unified Cloud Provider Access <ak8so-unified-access>`.
22+
- :ref:`Unified Cloud Provider Integrations <ak8so-unified-access>`.
2323
- :ref:`custom database roles <ak8so-configure-custom-database-roles>`.
2424
- :ref:`X.509 authentication <ak8so-x509>`
2525
- :ref:`Encryption at Rest <ak8so-ear>`.
@@ -157,7 +157,7 @@ steps.
157157
Secret Storage </ak8so-secret-storage>
158158
Network Peering </ak8so-network-peering>
159159
Private Endpoints </ak8so-private-link>
160-
Cloud Provider Access </ak8so-unified-access>
160+
Cloud Provider Integrations </ak8so-unified-access>
161161
Custom Database Roles </ak8so-configure-custom-database-roles>
162162
X.509 </ak8so-x509>
163163
Encrypt Data </ak8so-encryption-at-rest-customer-keys>

0 commit comments

Comments
 (0)