11.. _ak8so-unified-access:
22
3- ====================================
4- Set Up Unified Cloud Provider Access
5- ====================================
3+ ==========================================
4+ Set Up Unified Cloud Provider Integrations
5+ ==========================================
66
77.. default-domain:: mongodb
88
@@ -30,14 +30,14 @@ Procedure
3030.. procedure::
3131 :style: normal
3232
33- .. step:: Add the ``spec.cloudProviderAccessRoles `` fields to the ``AtlasProject`` custom resource.
33+ .. step:: Add the ``spec.cloudProviderIntegrations `` fields to the ``AtlasProject`` custom resource.
3434
3535 a. Specify an empty value placeholder within the
36- `` spec.cloudProviderAccessRoles .iamAssumedRoleArn` `
36+ :setting:` spec.cloudProviderIntegrations .iamAssumedRoleArn`
3737 parameter of the :ref:`atlasproject-custom-resource`.
3838
3939 #. Specify ``AWS`` within the
40- `` spec.cloudProviderAccessRoles .providerName` `
40+ :setting:` spec.cloudProviderIntegrations .providerName`
4141 parameter of the :ref:`atlasproject-custom-resource`.
4242
4343 **Example:**
@@ -57,7 +57,7 @@ Procedure
5757 projectIpAccessList:
5858 - ipAddress: "192.0.2.15"
5959 comment: "IP address for Application"
60- cloudProviderAccessRoles :
60+ cloudProviderIntegrations :
6161 - providerName: "AWS"
6262 iamAssumedRoleArn: ""
6363 EOF
@@ -78,7 +78,7 @@ Procedure
7878 .. input::
7979 :language: sh
8080
81- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles .atlasAWSAccountArn.type}'
81+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations .atlasAWSAccountArn.type}'
8282
8383 .. output::
8484 :language: json
@@ -94,7 +94,7 @@ Procedure
9494 .. input::
9595 :language: sh
9696
97- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles .atlasAssumedRoleExternalId.type}'
97+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations .atlasAssumedRoleExternalId.type}'
9898
9999 .. output::
100100 :language: json
@@ -129,7 +129,7 @@ Procedure
129129 .. step:: Authorize the |iam| role's access using {+ak8so+}.
130130
131131 Replace the empty value placeholder within the
132- `` spec.cloudProviderAccessRoles .iamAssumedRoleArn` `
132+ :setting:` spec.cloudProviderIntegrations .iamAssumedRoleArn`
133133 parameter of the :ref:`atlasproject-custom-resource` with
134134 the |iam| role's |aws| |arn| from the previous step.
135135
@@ -150,25 +150,25 @@ Procedure
150150 projectIpAccessList:
151151 - ipAddress: "192.0.2.15"
152152 comment: "IP address for Application"
153- cloudProviderAccessRoles :
153+ cloudProviderIntegrations :
154154 - providerName: "AWS"
155155 iamAssumedRoleArn: "arn:aws:iam::123456789012:role/aws-service-role/support.amazonaws.com/myRole"
156156 EOF
157157
158- .. step:: Check the status of the ``cloudProviderAccessRole ``.
158+ .. step:: Check the status of the ``cloudProviderIntegrations ``.
159159
160160 a. Run the command to retrieve the status:
161161
162162 .. code-block:: sh
163163
164- kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderAccessRoles }'
164+ kubectl get atlasprojects my-project -o=jsonpath='{.status.cloudProviderIntegrations }'
165165
166166 #. Check for the ``READY`` status.
167167
168168 - If the status is ``CREATED``, |service| created the role but
169169 you have not authorized it within |aws|.
170170 - If the status is ``EMPTY_ARN``, |service| created the role
171171 but you have not specified the
172- ``spec.cloudProviderAccessRoles .iamAssumedRoleArn``.
172+ ``spec.cloudProviderIntegrations .iamAssumedRoleArn``.
173173 - If the status is ``READY``, |service| has created the role
174174 and you have authorized it within |aws|.
0 commit comments