From 5c22e4a0ce6039544e3f5dda4eb7fc9095c60974 Mon Sep 17 00:00:00 2001 From: davidrobert Date: Thu, 11 Apr 2024 14:38:09 +0300 Subject: [PATCH] Add Cloud integration references to docs --- docs/getting-started/README.mdx | 10 +++++++++ .../configuration/intents-operator/README.mdx | 21 +++++++++++++++++++ 2 files changed, 31 insertions(+) diff --git a/docs/getting-started/README.mdx b/docs/getting-started/README.mdx index 2e6928edd..edf2618c1 100644 --- a/docs/getting-started/README.mdx +++ b/docs/getting-started/README.mdx @@ -29,6 +29,16 @@ export const features = [ icon: '/img/icons/aws.png', url: '/features/aws-iam/' }, + { + title: 'GCP IAM', + icon: '/img/icons/gcp.png', + url: '/features/gcp-iam/' + }, + { + title: 'Azure IAM', + icon: '/img/icons/azure.png', + url: '/features/azure-iam/' + }, { title: 'Kafka', icon: '/img/icons/kafka-no-word-mark.svg', diff --git a/docs/reference/configuration/intents-operator/README.mdx b/docs/reference/configuration/intents-operator/README.mdx index 51c2ea209..6fd2961db 100644 --- a/docs/reference/configuration/intents-operator/README.mdx +++ b/docs/reference/configuration/intents-operator/README.mdx @@ -61,6 +61,27 @@ This meant that if you had no network policies on a pod, and created ClientInten This behavior can be disabled using the Helm chart's values. +### AWS IAM +The intents operator enables automatic management of AWS IAM roles and policies according to the +declared intents. It works together with the [Otterize credentials operator](/reference/configuration/credentials-operator) to easily enable secure access +to AWS cloud resources from client pods, all in your Kubernetes cluster. + +Try the [AWS IAM tutorial](https://docs.otterize.com/quickstart/access-control/aws-iam-eks) to learn more. + +### Azure IAM +The intents operator enables automatic management of Azure IAM identities and role assignments according to the +declared intents. It works together with the [Otterize credentials operator](/reference/configuration/credentials-operator) to easily enable secure access +to Azure cloud resources from client pods, all in your Kubernetes cluster. + +Try the [Azure IAM tutorial](https://docs.otterize.com/features/azure-iam/tutorials/azure-iam-aks) to learn more. + +### Google Cloud IAM +The intents operator enables automatic management of Google Cloud service accounts and policies according to the +declared intents. It works together with the [Otterize credentials operator](/reference/configuration/credentials-operator) to easily enable secure access +to Azure cloud resources from client pods, all in your Kubernetes cluster. + +Try the [GCP IAM tutorial](https://docs.otterize.com/features/gcp-iam/tutorials/gcp-iam-gke) to learn more. + ### Kafka mTLS & ACLs The intents operator automatically creates, updates, and deletes ACLs in Kafka clusters running within your Kubernetes cluster according to the declared intents. It does not modify other ACLs. It works together with the [Otterize credentials operator](/reference/configuration/credentials-operator) to easily enable secure access to Kafka from client pods, all in your Kubernetes cluster.