From a1ff28c8b5f25bbedacae2e07b2fdfefc2989074 Mon Sep 17 00:00:00 2001 From: Shruti Deshpande Date: Fri, 27 Jun 2025 11:35:28 +0530 Subject: [PATCH] mod docs OADP on GCP Signed-off-by: Shruti Deshpande --- .../installing/installing-oadp-gcp.adoc | 1 + modules/migration-configuring-gcp.adoc | 1 + modules/oadp-gcp-wif-cloud-authentication.adoc | 1 + 3 files changed, 3 insertions(+) diff --git a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc index db7a7917fc..7e83a043ef 100644 --- a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc +++ b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc @@ -9,6 +9,7 @@ include::_attributes/common-attributes.adoc[] toc::[] +[role="_abstract"] You install the OpenShift API for Data Protection (OADP) with Google Cloud Platform (GCP) by installing the OADP Operator. The Operator installs link:https://{velero-domain}/docs/v{velero-version}/[Velero {velero-version}]. include::snippets/oadp-mtc-operator.adoc[] diff --git a/modules/migration-configuring-gcp.adoc b/modules/migration-configuring-gcp.adoc index 59e859e31b..923715d9b1 100644 --- a/modules/migration-configuring-gcp.adoc +++ b/modules/migration-configuring-gcp.adoc @@ -8,6 +8,7 @@ [id="migration-configuring-gcp_{context}"] = Configuring Google Cloud Platform +[role="_abstract"] ifdef::installing-3-4,installing-mtc[] You configure a Google Cloud Platform (GCP) storage bucket as a replication repository for the {mtc-first}. endif::[] diff --git a/modules/oadp-gcp-wif-cloud-authentication.adoc b/modules/oadp-gcp-wif-cloud-authentication.adoc index f0fdae664b..261c468883 100644 --- a/modules/oadp-gcp-wif-cloud-authentication.adoc +++ b/modules/oadp-gcp-wif-cloud-authentication.adoc @@ -6,6 +6,7 @@ [id="oadp-gcp-wif-cloud-authentication_{context}"] = Google workload identity federation cloud authentication +[role="_abstract"] Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed. With Google's workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.