1
1
.. _ak8so-unified-access:
2
2
3
- ====================================
4
- Set Up Unified Cloud Provider Access
5
- ====================================
3
+ ==========================================
4
+ Set Up Unified Cloud Provider Integrations
5
+ ==========================================
6
6
7
7
.. default-domain:: mongodb
8
8
@@ -30,14 +30,14 @@ Procedure
30
30
.. procedure::
31
31
:style: normal
32
32
33
- .. step:: Add the ``spec.cloudProviderAccessRoles `` fields to the ``AtlasProject`` custom resource.
33
+ .. step:: Add the ``spec.cloudProviderIntegrations `` fields to the ``AtlasProject`` custom resource.
34
34
35
35
a. Specify an empty value placeholder within the
36
- `` spec.cloudProviderAccessRoles .iamAssumedRoleArn` `
36
+ :setting:` spec.cloudProviderIntegrations .iamAssumedRoleArn`
37
37
parameter of the :ref:`atlasproject-custom-resource`.
38
38
39
39
#. Specify ``AWS`` within the
40
- `` spec.cloudProviderAccessRoles .providerName` `
40
+ :setting:` spec.cloudProviderIntegrations .providerName`
41
41
parameter of the :ref:`atlasproject-custom-resource`.
42
42
43
43
**Example:**
@@ -57,7 +57,7 @@ Procedure
57
57
projectIpAccessList:
58
58
- ipAddress: "192.0.2.15"
59
59
comment: "IP address for Application"
60
- cloudProviderAccessRoles :
60
+ cloudProviderIntegrations :
61
61
- providerName: "AWS"
62
62
iamAssumedRoleArn: ""
63
63
EOF
@@ -78,7 +78,7 @@ Procedure
78
78
.. input::
79
79
:language: sh
80
80
81
- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles .atlasAWSAccountArn.type}'
81
+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations .atlasAWSAccountArn.type}'
82
82
83
83
.. output::
84
84
:language: json
@@ -94,7 +94,7 @@ Procedure
94
94
.. input::
95
95
:language: sh
96
96
97
- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles .atlasAssumedRoleExternalId.type}'
97
+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations .atlasAssumedRoleExternalId.type}'
98
98
99
99
.. output::
100
100
:language: json
@@ -129,7 +129,7 @@ Procedure
129
129
.. step:: Authorize the |iam| role's access using {+ak8so+}.
130
130
131
131
Replace the empty value placeholder within the
132
- `` spec.cloudProviderAccessRoles .iamAssumedRoleArn` `
132
+ :setting:` spec.cloudProviderIntegrations .iamAssumedRoleArn`
133
133
parameter of the :ref:`atlasproject-custom-resource` with
134
134
the |iam| role's |aws| |arn| from the previous step.
135
135
@@ -150,25 +150,25 @@ Procedure
150
150
projectIpAccessList:
151
151
- ipAddress: "192.0.2.15"
152
152
comment: "IP address for Application"
153
- cloudProviderAccessRoles :
153
+ cloudProviderIntegrations :
154
154
- providerName: "AWS"
155
155
iamAssumedRoleArn: "arn:aws:iam::123456789012:role/aws-service-role/support.amazonaws.com/myRole"
156
156
EOF
157
157
158
- .. step:: Check the status of the ``cloudProviderAccessRole ``.
158
+ .. step:: Check the status of the ``cloudProviderIntegrations ``.
159
159
160
160
a. Run the command to retrieve the status:
161
161
162
162
.. code-block:: sh
163
163
164
- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles }'
164
+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations }'
165
165
166
166
#. Check for the ``READY`` status.
167
167
168
168
- If the status is ``CREATED``, |service| created the role but
169
169
you have not authorized it within |aws|.
170
170
- If the status is ``EMPTY_ARN``, |service| created the role
171
171
but you have not specified the
172
- ``spec.cloudProviderAccessRoles .iamAssumedRoleArn``.
172
+ ``spec.cloudProviderIntegrations .iamAssumedRoleArn``.
173
173
- If the status is ``READY``, |service| has created the role
174
174
and you have authorized it within |aws|.
0 commit comments