1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

mod docs OADP on GCP

Signed-off-by: Shruti Deshpande <shdeshpa@redhat.com>
This commit is contained in:
Shruti Deshpande
2025-06-27 11:35:28 +05:30
committed by openshift-cherrypick-robot
parent a4db55dddf
commit a1ff28c8b5
3 changed files with 3 additions and 0 deletions

View File

@@ -9,6 +9,7 @@ include::_attributes/common-attributes.adoc[]
toc::[]
[role="_abstract"]
You install the OpenShift API for Data Protection (OADP) with Google Cloud Platform (GCP) by installing the OADP Operator. The Operator installs link:https://{velero-domain}/docs/v{velero-version}/[Velero {velero-version}].
include::snippets/oadp-mtc-operator.adoc[]

View File

@@ -8,6 +8,7 @@
[id="migration-configuring-gcp_{context}"]
= Configuring Google Cloud Platform
[role="_abstract"]
ifdef::installing-3-4,installing-mtc[]
You configure a Google Cloud Platform (GCP) storage bucket as a replication repository for the {mtc-first}.
endif::[]

View File

@@ -6,6 +6,7 @@
[id="oadp-gcp-wif-cloud-authentication_{context}"]
= Google workload identity federation cloud authentication
[role="_abstract"]
Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed.
With Google's workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.