Realm9 Logo
Search documentation...

Cloud Connections

Cloud Connections allow you to integrate your AWS, Azure, and GCP accounts with Realm9 for Terraform automation and infrastructure management.

Overview

Connect cloud providers to:

  • Deploy infrastructure with Terraform
  • Manage cloud resources
  • Track costs across providers
  • Centralize cloud operations

Supported Providers

AWS

  • IAM role-based authentication
  • Cross-account access
  • Multiple account support
  • Region configuration

Azure

  • Service Principal authentication
  • Subscription management
  • Resource group access
  • Multi-tenant support

GCP

  • Service Account authentication
  • Project-based access
  • Multiple project support
  • Regional deployment

Creating a Connection

AWS Connection

  1. Navigate to Terraform > Cloud Connections
  2. Click Add Connection > AWS
  3. Enter connection name
  4. Configure IAM role ARN
  5. Select regions
  6. Test connection
  7. Save

Azure Connection

  1. Click Add Connection > Azure
  2. Enter connection details
  3. Provide Service Principal credentials
  4. Select subscription
  5. Test connection
  6. Save

GCP Connection

  1. Click Add Connection > GCP
  2. Enter connection name
  3. Upload Service Account JSON
  4. Select project
  5. Test connection
  6. Save

Security Best Practices

Least Privilege

  • Grant minimum required permissions
  • Use dedicated service accounts
  • Rotate credentials regularly
  • Audit access logs

IAM Roles (AWS)

  • Use cross-account roles
  • Enable MFA requirements
  • Set external ID for security
  • Limit trust relationships

Service Principals (Azure)

  • Use application-specific principals
  • Set expiration on secrets
  • Limit scope to required subscriptions
  • Enable conditional access

Service Accounts (GCP)

  • Create project-specific accounts
  • Use workload identity when possible
  • Rotate keys regularly
  • Enable audit logging

Managing Connections

Edit Connection

  • Update credentials
  • Modify regions/subscriptions
  • Change connection name
  • Test connectivity

Delete Connection

  • Check for dependent resources
  • Remove Terraform workspaces first
  • Confirm deletion
  • Revoke cloud provider access

Troubleshooting

Connection Test Fails

  • Verify credentials
  • Check IAM permissions
  • Confirm network connectivity
  • Review error messages

Terraform Runs Fail

  • Validate connection is active
  • Check provider-specific permissions
  • Verify region/location settings
  • Review Terraform logs

Next Steps