Cloud Connections
Cloud Connections allow you to integrate your AWS, Azure, and GCP accounts with Realm9 for Terraform automation and infrastructure management.
Overview
Connect cloud providers to:
- Deploy infrastructure with Terraform
- Manage cloud resources
- Track costs across providers
- Centralize cloud operations
Supported Providers
AWS
- IAM role-based authentication
- Cross-account access
- Multiple account support
- Region configuration
Azure
- Service Principal authentication
- Subscription management
- Resource group access
- Multi-tenant support
GCP
- Service Account authentication
- Project-based access
- Multiple project support
- Regional deployment
Creating a Connection
AWS Connection
- Navigate to Terraform > Cloud Connections
- Click Add Connection > AWS
- Enter connection name
- Configure IAM role ARN
- Select regions
- Test connection
- Save
Azure Connection
- Click Add Connection > Azure
- Enter connection details
- Provide Service Principal credentials
- Select subscription
- Test connection
- Save
GCP Connection
- Click Add Connection > GCP
- Enter connection name
- Upload Service Account JSON
- Select project
- Test connection
- Save
Security Best Practices
Least Privilege
- Grant minimum required permissions
- Use dedicated service accounts
- Rotate credentials regularly
- Audit access logs
IAM Roles (AWS)
- Use cross-account roles
- Enable MFA requirements
- Set external ID for security
- Limit trust relationships
Service Principals (Azure)
- Use application-specific principals
- Set expiration on secrets
- Limit scope to required subscriptions
- Enable conditional access
Service Accounts (GCP)
- Create project-specific accounts
- Use workload identity when possible
- Rotate keys regularly
- Enable audit logging
Managing Connections
Edit Connection
- Update credentials
- Modify regions/subscriptions
- Change connection name
- Test connectivity
Delete Connection
- Check for dependent resources
- Remove Terraform workspaces first
- Confirm deletion
- Revoke cloud provider access
Troubleshooting
Connection Test Fails
- Verify credentials
- Check IAM permissions
- Confirm network connectivity
- Review error messages
Terraform Runs Fail
- Validate connection is active
- Check provider-specific permissions
- Verify region/location settings
- Review Terraform logs
