Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(WIP) Adding Insights Hub page and get-started #13667

Draft
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

interurban
Copy link
Collaborator

@interurban interurban commented Dec 19, 2024

With the recent launch of insights 2.0, this docs change has the following elements:

WIP/Todo:

@pulumi-bot
Copy link
Collaborator

@interurban interurban marked this pull request as draft December 19, 2024 00:17
expanded_menu_ids:
- insights-get-started
- insights-concepts
meta_desc: Pulumi Insights provides intelligent infrastructure management with AI-powered, asset management, and compliance remediation across all your cloud resources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this seems odd:

AI-powered, asset management, and compliance remediation

maybe just for me

meta_image: /images/docs/meta-images/insights-meta.png
h1: Pulumi Insights Documentation
description: |
Pulumi Insights offers an intelligent platform for discovering, understanding, and managing cloud infrastructure with AI-driven analysis, compliance enforcement, and more!
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this one seems better

- type: flat
heading: Overview
description_md: |
Pulumi Insights enables you to manage and optimize cloud infrastructure with AI-powered tools for discovery, compliance, and cost efficiency. It brings visibility across all resources, including those not provisioned by Pulumi, such as AWS CloudFormation, Microsoft ARM, and Terraform-managed infrastructure.
Copy link
Contributor

@tyler-dunkel tyler-dunkel Dec 19, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Terraform-managed infrastructure

maybe change to just terraform. Nit, either is fine.

With Pulumi Insights, you can:
- Detect and remediate security violations.
- Enforce compliance policies across your organization.
- Analyze cloud usage trends to optimize costs.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just fyi idk how much we want to talk about things that arent released yet. We dont track cost data but suppose you could still analyze usage and do you own cost optimization.


It provides:

- **Resource Search**: Explore all of your resources under management.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe mark this as stack/account?


- **Data Export**: Export your Pulumi resources into your business intelligence tool of choice to go even further.

- **Cloud Import**: Bring your own cloud provider account and import all your existing resources into Pulumi to see how things break down. Zero code required.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this should be higher. it is the core of insights is to provide access to unmanaged resources


Pulumi Insights give you the tools to:

- **Discover**: Scan and sync all your cloud infrastructure – including resources provisioned manually or through other tools like Terraform, CloudFormation, and ARM – to bring everything under a single pane of glass. Gain complete visibility across clouds, regions, and accounts.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

probably worth calling out that we also scan k8s containers here and will eventually support tons of pulumi providers including sass tools like github

- Child account (region): `insights-aws-account/us-central-1`
- Child account (region): `insights-aws-account/us-west-1`

It's important to note that if you **San** or **Delete** the `insights-aws-account` account, Pulumi applies this action to all child accounts.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

San => Scan


First, let's run through a few prerequisites and quick steps to ensure you ready to create your first Account Discovery scan.

- Ensure you’re an admin of your Pulumi organization.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will be removing this requirement soon. Members will be allowed to create accounts so long as their org settings allow it

1. Log in to the [AWS Management Console](https://console.aws.amazon.com/iam/).
2. Go to the **Roles** section and create a new role.
3. Select the **Web identity** trusted entity type and choose `api.pulumi.com/oidc` as your identity provider.
4. Select the name of your Pulumi organization under **Audience**.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this needs to be {orgName}:aws. but should confirm with ESC team

"Condition": {
"StringEquals": {
"api.pulumi.com/oidc:aud": [
"pulumi"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe I am wrong here and the org isnt needed. not sure now. I know we set ours up with pulumi:aws

@pulumi-bot
Copy link
Collaborator

@pulumi-bot
Copy link
Collaborator

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants