Skip to content

Commit 491c057

Browse files
authored
Merge pull request #96427 from openshift-cherrypick-robot/cherry-pick-95326-to-enterprise-4.19
[enterprise-4.19] mod docs OADP on GCP
2 parents a8903e2 + 5673ae3 commit 491c057

File tree

3 files changed

+3
-0
lines changed

3 files changed

+3
-0
lines changed

backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ include::_attributes/common-attributes.adoc[]
99

1010
toc::[]
1111

12+
[role="_abstract"]
1213
You install the OpenShift API for Data Protection (OADP) with Google Cloud Platform (GCP) by installing the OADP Operator. The Operator installs link:https://{velero-domain}/docs/v{velero-version}/[Velero {velero-version}].
1314

1415
include::snippets/oadp-mtc-operator.adoc[]

modules/migration-configuring-gcp.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
[id="migration-configuring-gcp_{context}"]
99
= Configuring Google Cloud Platform
1010

11+
[role="_abstract"]
1112
ifdef::installing-3-4,installing-mtc[]
1213
You configure a Google Cloud Platform (GCP) storage bucket as a replication repository for the {mtc-first}.
1314
endif::[]

modules/oadp-gcp-wif-cloud-authentication.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
[id="oadp-gcp-wif-cloud-authentication_{context}"]
77
= Google workload identity federation cloud authentication
88

9+
[role="_abstract"]
910
Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed.
1011

1112
With Google's workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.

0 commit comments

Comments
 (0)