From c067a7c96dc651b34137ace66fc1822bd163c6da Mon Sep 17 00:00:00 2001 From: Shruti Deshpande Date: Fri, 27 Jun 2025 11:35:28 +0530 Subject: [PATCH] mod docs OADP on GCP Signed-off-by: Shruti Deshpande --- .../installing/installing-oadp-gcp.adoc | 1 + modules/migration-configuring-gcp.adoc | 1 + modules/oadp-gcp-wif-cloud-authentication.adoc | 1 + 3 files changed, 3 insertions(+) diff --git a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc index cabd605f5903..b6cc1439119b 100644 --- a/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc +++ b/backup_and_restore/application_backup_and_restore/installing/installing-oadp-gcp.adoc @@ -9,6 +9,7 @@ include::_attributes/common-attributes.adoc[] toc::[] +[role="_abstract"] You install the OpenShift API for Data Protection (OADP) with Google Cloud Platform (GCP) by installing the OADP Operator. The Operator installs link:https://{velero-domain}/docs/v{velero-version}/[Velero {velero-version}]. include::snippets/oadp-mtc-operator.adoc[] diff --git a/modules/migration-configuring-gcp.adoc b/modules/migration-configuring-gcp.adoc index 59e859e31bf1..923715d9b191 100644 --- a/modules/migration-configuring-gcp.adoc +++ b/modules/migration-configuring-gcp.adoc @@ -8,6 +8,7 @@ [id="migration-configuring-gcp_{context}"] = Configuring Google Cloud Platform +[role="_abstract"] ifdef::installing-3-4,installing-mtc[] You configure a Google Cloud Platform (GCP) storage bucket as a replication repository for the {mtc-first}. endif::[] diff --git a/modules/oadp-gcp-wif-cloud-authentication.adoc b/modules/oadp-gcp-wif-cloud-authentication.adoc index f0fdae664b5a..261c4688834c 100644 --- a/modules/oadp-gcp-wif-cloud-authentication.adoc +++ b/modules/oadp-gcp-wif-cloud-authentication.adoc @@ -6,6 +6,7 @@ [id="oadp-gcp-wif-cloud-authentication_{context}"] = Google workload identity federation cloud authentication +[role="_abstract"] Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed. With Google's workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.