-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs update for aws compute scanner #268
Conversation
WalkthroughThe pull request introduces documentation for AWS integration, specifically adding an entry for AWS in the integrations metadata and creating a new documentation page for the AWS Compute Scanner. The change expands the documentation to include AWS as a supported integration platform, with a detailed explanation of the Managed AWS Compute Scanner's functionality for importing and managing AWS compute resources. Changes
Sequence DiagramsequenceDiagram
participant User
participant Ctrlplane
participant AWS
User->>Ctrlplane: Add new AWS provider
Ctrlplane->>AWS: Request IAM role access
AWS-->>Ctrlplane: Grant IAM role
Ctrlplane->>AWS: Scan compute resources
AWS-->>Ctrlplane: Return compute resources
Ctrlplane-->>User: Display imported resources
Possibly related PRs
Poem
📜 Recent review detailsConfiguration used: .coderabbit.yaml 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
Documentation and Community
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (4)
apps/docs/pages/integrations/aws/compute-scanner.mdx (4)
3-8
: Consider adding more context about resource typesWhile the documentation clearly states EKS support, it might be helpful to:
- Clarify what "instances" means in this context
- Indicate if there are plans to support other AWS compute resources in the future
- Add links to AWS documentation for the supported services
17-20
: Fix typo and enhance clarity
- "enabeld" should be "enabled"
- Consider providing a more specific estimate for the scanning time or factors that might affect it
-After the integration is enabeld, you can add a new provider, select the Managed +After the integration is enabled, you can add a new provider, select the Managed
44-60
: Clarify placeholder valuesThe documentation should explain:
- How to obtain the correct
<account-id>
- What
<workspace>
refers to and how to determine its value- Add an example with actual values (using dummy account numbers)
1-60
: Consider adding essential documentation sectionsThe documentation would benefit from additional sections:
- Prerequisites (required permissions, AWS account setup)
- Troubleshooting guide (common issues and solutions)
- Limitations or known issues
- Example workflow with screenshots
Would you like me to help draft these additional sections?
📜 Review details
Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (2)
apps/docs/pages/integrations/_meta.ts
(1 hunks)apps/docs/pages/integrations/aws/compute-scanner.mdx
(1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
apps/docs/pages/integrations/_meta.ts (1)
Pattern **/*.{ts,tsx}
: Note on Error Handling:
Avoid strict enforcement of try/catch blocks. Code may use early returns, Promise chains (.then().catch()), or other patterns for error handling. These are acceptable as long as they maintain clarity and predictability.
🔇 Additional comments (2)
apps/docs/pages/integrations/_meta.ts (1)
4-4
: LGTM!
The AWS integration entry is correctly added and maintains the alphabetical ordering of the integrations list.
apps/docs/pages/integrations/aws/compute-scanner.mdx (1)
31-42
:
Review broad IAM permissions
The current policy grants full access (*
) to all EKS and EC2 resources. Consider:
- Limiting to specific required actions instead of
eks:*
andec2:*
- Adding a comment explaining why such broad permissions are needed
- Adding a security note about following the principle of least privilege
Summary by CodeRabbit