diff --git a/content/docs/iac/guides/migration/migrating-to-pulumi/from-arm.md b/content/docs/iac/guides/migration/migrating-to-pulumi/from-arm.md index d0c93701b931..1580cf8fa51f 100644 --- a/content/docs/iac/guides/migration/migrating-to-pulumi/from-arm.md +++ b/content/docs/iac/guides/migration/migrating-to-pulumi/from-arm.md @@ -60,7 +60,7 @@ While Bicep addresses some of the shortcomings of ARM templates, it remains boun 1. **Prerequisites**: * Install the [Pulumi GitHub app](/docs/iac/guides/continuous-delivery/github-app/) with access to your repository that contains your ARM template files * Configure Azure credentials in [Pulumi ESC](/docs/esc/) - * Have Neo access (available in [Pulumi Cloud](/product/pulumi-cloud/)) + * Have [Pulumi Neo](/product/neo/) access 2. **Start the migration**: diff --git a/content/docs/iac/guides/migration/migrating-to-pulumi/from-cloudformation.md b/content/docs/iac/guides/migration/migrating-to-pulumi/from-cloudformation.md index ca180bb7edac..4a92e77925a8 100644 --- a/content/docs/iac/guides/migration/migrating-to-pulumi/from-cloudformation.md +++ b/content/docs/iac/guides/migration/migrating-to-pulumi/from-cloudformation.md @@ -37,7 +37,7 @@ If your team has already provisioned infrastructure using AWS CloudFormation, an 1. **Prerequisites**: * Install the [Pulumi GitHub app](/docs/iac/guides/continuous-delivery/github-app/) with access to your repository that contains your CloudFormation template files * Configure AWS credentials in [Pulumi ESC](/docs/esc/) - * Have Neo access (available in [Pulumi Cloud](/product/pulumi-cloud/)) + * Have [Pulumi Neo](/product/neo/) access 1. **Start the migration**: diff --git a/content/docs/iac/guides/migration/migrating-to-pulumi/from-serverless.md b/content/docs/iac/guides/migration/migrating-to-pulumi/from-serverless.md index c7d489f49589..3c682dfec9b1 100644 --- a/content/docs/iac/guides/migration/migrating-to-pulumi/from-serverless.md +++ b/content/docs/iac/guides/migration/migrating-to-pulumi/from-serverless.md @@ -53,7 +53,7 @@ Because the Serverless Framework creates standard CloudFormation stacks, [Neo](/ 1. **Prerequisites**: * Install the [Pulumi GitHub app](/docs/iac/guides/continuous-delivery/github-app/) with access to your repository * Configure AWS credentials in [Pulumi ESC](/docs/esc/) - * Have Neo access (available in [Pulumi Cloud](/product/pulumi-cloud/)) + * Have [Pulumi Neo](/product/neo/) access 1. **Identify your CloudFormation stacks**: Find the stack names created by the Serverless Framework (e.g., `my-api-dev`, `my-api-prod`). diff --git a/content/docs/iac/guides/migration/migrating-to-pulumi/from-terraform.md b/content/docs/iac/guides/migration/migrating-to-pulumi/from-terraform.md index 0c3ba9f2721b..8ae5b66d7328 100644 --- a/content/docs/iac/guides/migration/migrating-to-pulumi/from-terraform.md +++ b/content/docs/iac/guides/migration/migrating-to-pulumi/from-terraform.md @@ -37,7 +37,7 @@ If your infrastructure was provisioned with Terraform or the CDK for Terraform ( * Ensure you have access to your state file (`.tfstate`) * Install the [Pulumi GitHub app](/docs/iac/guides/continuous-delivery/github-app/) with access to your repository that contains your Terraform configuration files * Configure cloud credentials in [Pulumi ESC](/docs/esc/) - * Have Neo access (available in [Pulumi Cloud](/product/pulumi-cloud/)) + * Have [Pulumi Neo](/product/neo/) access 2. **Start the migration**: diff --git a/content/product/_index.md b/content/product/_index.md index 8ef2b7a1bd83..17d0f6958117 100644 --- a/content/product/_index.md +++ b/content/product/_index.md @@ -5,6 +5,12 @@ meta_image: /images/product/overview/overview-meta.png type: page layout: product-page +aliases: + - /product/pulumi-cloud/ + - /product/pulumi-service/ + - /product/cloud/ + - /cloud/ + sections: - type: hero title_primary: The unified platform diff --git a/content/product/pulumi-cloud.md b/content/product/pulumi-cloud.md deleted file mode 100644 index 24168b580fe1..000000000000 --- a/content/product/pulumi-cloud.md +++ /dev/null @@ -1,369 +0,0 @@ ---- -title: Pulumi Cloud -layout: pulumi-cloud - -meta_desc: Pulumi Cloud is the smartest and easiest way to automate, secure, and manage your cloud. -aliases: - - /product/pulumi-service/ - - /product/cloud/ - - /cloud/ - -overview: - title: Intelligent Infrastructure Management - description: | - Pulumi Cloud is the smartest and easiest way to automate, secure, and manage everything you run in the cloud. It stores infrastructure state, centralizes secrets management, provides search and clear visibility into all your clouds, runs remote deployments, integrates with CI/CD pipelines, and enforces security and compliance policies. - -case_studies: - title: Customers innovating with Pulumi Cloud - items: - - name: Atlassian - link: /case-studies/atlassian/ - logo: atlassian - description: | - Developers reduced their time spent on maintenance by 50%. - - - name: Elkjop - link: /case-studies/elkjop-nordic/ - logo: elkjop-nordic - description: | - Increased developers' agility and speed through platform engineering. - - - name: Starburst - link: /blog/how-starburst-data-creates-infrastructure-automation-magic-with-code/ - logo: starburst - description: | - Increased velocity and speed, with deployments that are up to 3x faster. - - - name: BMW - link: /case-studies/bmw/ - logo: bmw - description: | - Enabled developers to deploy across hybrid cloud environments. - - - name: Lemonade - link: /case-studies/lemonade/ - logo: lemonade - description: | - Standardized infrastructure architectures with reusable components. - - - name: Snowflake - link: /case-studies/snowflake/ - logo: snowflake - description: | - Built a multi-cloud, Kubernetes-based platform to standardize all deployments - -products: - - header: Products - content: - - header: Pulumi IaC - tabid: iac-select - subheader: Productive cloud automation - link: /product/infrastructure-as-code/ - image: /images/product/console-resource-graph.svg - details: - - title: Fully-managed, single source of truth - description: | - Pulumi Cloud is a fully managed service for [infrastructure as code](/what-is/what-is-infrastructure-as-code/). Store your infrastructure’s state for any cloud in Pulumi's secure backend, which has built-in scaling, availability, and fault tolerance. You also get access to granular access controls, CICD integrations, SAML/SCIM, audit logging, and more. - - more_info: | - Allow developers to safely deploy in parallel with concurrent state-locking. - - Audit changes or rollback to previous versions with a [complete history](/docs/iac/concepts/state-and-backends/#checkpoints) of your state. - - - title: Manage infrastructure secrets and configuration - description: | - Use built-in [secrets management](/what-is/what-is-secrets-management/) for encrypted data such as credentials or tokens. Store and manage collections of config in [Pulumi ESC](/product/esc) into environment groupings. - - more_info: | - Your infrastructure [state is encrypted](/docs/iac/concepts/state-and-backends/#state-encryption) in transit and at rest. - - Sensitive configurations (e.g. database passwords, cloud tokens) are [stored as secrets](/docs/concepts/secrets/). - - Use Pulumi's secrets manager or integrate with AWS KMS, Azure Key Vault, Google KMS, and HashiCorp Vault. - - title: IaC as a programmatic interface - description: | - With [Automation API](/automation), you can use the Pulumi engine as a strongly typed SDK in your application code, enabling it to call functions that can provision and configure infrastructure on any cloud. - - more_info: | - Automation API enables you to build custom cloud interfaces for your technical end users. For example, build self-service developer portals, CLIs, frameworks, and CI/CD workflows. - - Easily build high-scale, SaaS applications that serve customers with single-tenant instances. Automate creating and managing infrastructure for thousands of unique customers. - - title: Software delivery integrations - description: | - Integrate Pulumi with your software delivery pipeline so that you can version, build, test, and deploy infrastructure code like software. - - more_info: | - Work with existing tools like IDEs, test frameworks, and package managers. - - Integrate your source control system so teams can trace changes back to commits and pull requests. - - Continuously deliver infrastructure through existing pipelines with [CI/CD integrations](/docs/iac/packages-and-automation/continuous-delivery/). - - Use event-based [webhooks](/docs/platform/webhooks/) to notify external services like Slack or continuous integration tools. - - Use [the Service API](/blog/pulumi-rest-api/) to manage stacks, updates, teams, and more. - - header: Pulumi ESC - tabid: esc-select - subheader: Automatic cloud security - link: /product/esc/ - image: /images/product/esc-screenshot-2.png - details: - - title: Stop secrets sprawl - description: | - Pull and sync configuration and secrets with any secrets store – including HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, 1Password, and more – and consume in any application, tool, or CI/CD platform. - - more_info: | - Access, share, and manage confidential information such as secrets, passwords, and API keys as well as configuration information such as network settings and deployment options. - - Environments support importing one into another, allowing for easy composability and inheritance of shared secrets and configuration. - - Every change to an environment as well as any of its secrets and configuration is versioned, so rolling back or accessing an old version is easy. - - - title: Trust (and prove) your secrets are secure - description: | - Every environment can be locked down with role-based access controls (RBAC) and versioned with all changes fully logged for auditing. - - more_info: | - Pulumi ESC leverages the same Pulumi Cloud identity, RBAC, Teams, SAML/SCIM, OIDC, and scoped access tokens used for Pulumi IaC to ensure secrets management complies with enterprise security policies. - - Every time secrets or configuration values are accessed or changed with Pulumi ESC, the action is fully logged for auditing. Logs include who accessed what, the action they took, and even a full record showing which originating environments the accessed values are inherited from. - - - title: Ditch .env files - description: | - No more storing secrets in plaintext on dev computers. Developers can easily access secrets via CLI, API, Kubernetes operator, the Pulumi Cloud UI, and in-code with Typescript/Javascript, Python, and Go SDKs. - - more_info: | - Pulumi ESC also provides just-in-time, short-lived credentials, making them easy to adopt as a security best practice. - - - title: Use with or without Pulumi IaC - description: | - Use Pulumi ESC to centrally manage your configuration and secrets independently of Pulumi IaC, or use ESC and IaC together for the convenience of storing secrets in config with a higher degree of security than using plaintext. - - more_info: | - Developers can easily access secrets via CLI, API, Kubernetes operator, the Pulumi Cloud UI, and in-code with Typescript/Javascript, Python, and Go SDKs. - - header: Pulumi Insights - tabid: insights-select - subheader: Intelligent cloud management - link: /product/pulumi-insights/ - image: /images/product/resource-search-diagram.svg - details: - - title: Clear visibility across all infrastructure - description: | - View resources deployed in all your clouds, organized in projects and stacks, so that you know what's running and where. - - more_info: | - View dashboards for quick insights into your infrastructure, such as how many resources are running and who has made changes. - - [Tag stacks](/docs/concepts/stack/#stack-tags) for easier filtering and searching. - - Jump directly to the cloud console for each resource you've deployed with Pulumi. - - - title: Search for resources across all clouds - description: | - Easily look for resources in a single cloud or across all your clouds with structured queries or natural language search. - - more_info: | - Search for resources by filtering with facets like type, provider, project, and stack. - - Use a structured query syntax or natural language search (coming soon). - - Share queries with your teammates. - - header: Cross-Product Capabilities - content: - - header: Pulumi Policies - tabid: policies-select - subheader: Policy as code - link: /docs/insights/policy/ - image: /images/product/console-policy-group.svg - details: - - title: Proactive compliance enforcement - description: | - Set guardrails for developers deploying with Pulumi by creating [policy packs](/docs/insights/policy/policy-packs/) that enforce your [deployment rules](/docs/insights/policy/). - - more_info: | - Define [Policy as Code](/docs/insights/policy/) rules for security, best practices, and more. - - Assign [policy packs](/docs/insights/policy/policy-packs/) that run on specific stacks (e.g., dev/test/staging rules). - - Automatically block deployments that violate your organization's policies. - - title: Enterprise compliance enforcement - description: | - Business Critical customers can enforce [compliance](/docs/insights/policy/policy-packs/) and remediate non-compliance using Pulumi provided policies across your organization. - - more_info: | - Choose from hundreds of policies for AWS, Azure, Google Cloud, and Kubernetes. Support for PCI DSS, ISO 27001, SOC 2, and CIS Benchmarks. - - Set policy packs that block prohibited deployments across your entire organization, preventing issues. - - - title: Continuous and automatic compliance - description: | - Policies can remediate violations to fix the problems found in addition to reporting them as violations. - - more_info: | - Here are a few examples of the remediation policy use cases: - - - Tagging resources with standard, organization-wide tags. - - Disabling Internet access for gateways and firewall rules. - - Enabling encryption on storage or buckets. - - Down-sizing virtual machine configuration to use less expensive machine types. - - header: Pulumi Deployments - tabid: deployments-select - subheader: Infrastructure lifecycle management - link: /product/pulumi-deployments/ - image: /images/product/pulumi-deployments.png - details: - - title: Run cloud infrastructure operations remotely - description: | - [Run remote infrastructure commands](/docs/platform/deployments/) to provision, configure, and destroy cloud resources, all executed in a secure cloud environment. - - more_info: | - Trigger deployments via REST API, click to deploy from Pulumi Cloud's console, Git Push to Deploy, Remote Automation API, and other programmatic building blocks. - - Use a simple, centralized format for specifying everything needed to deploy your infrastructure stacks. - - - title: Manage infrastructure operations at high scale with Deployments-as-a-Service - description: | - Use the [Pulumi Deployments REST API](/docs/platform/deployments/api/) to programmatically trigger deployments for high volume infrastructure automation use cases. - - more_info: | - Call Pulumi's [REST API endpoint](/docs/platform/deployments/api/) to trigger Pulumi commands that run in Pulumi Cloud (e.g., update, destroy, refresh, preview). - - Offload your local Automation API deployment workloads to Pulumi Cloud via the [Remote Automation API feature](/docs/platform/deployments/#deployment-triggers). - - header: Pulumi Neo - tabid: neo-select - subheader: AI-powered infrastructure management - link: /product/neo/ - image: /images/product/neo-prompt.png - details: - - title: Generate infrastructure as code - description: | - Generate a Pulumi program and deploy cloud infrastructure in seconds with a few simple text prompts. - - more_info: | - **Example Pulumi Neo prompts:** - - *“Create a new serverless application on AWS”* - - *“Configure a Kubernetes cluster with best practices on Azure”* - - *“Deploy a Cloudflare worker that uses sticky load balancing to distribute traffic to my Google Cloud backend”* - - - title: Understand your team's cloud usage - description: | - Pulumi Neo has access to all of your Pulumi projects and stacks, and can relate those to your live cloud environments. - - more_info: | - **Example Pulumi Neo prompts:** - - *“What versions of Kubernetes do I currently have deployed?”* - - *“What AWS account does VPC vpc-04a11 live within?”* - - *“What environments do we have related to Azure?”* - - *“Describe the architecture of my www-frontend project.”* - - - title: Discover cost savings opportunities - description: | - Pulumi Neo uses a combination of Pulumi and cloud understanding to discover and reclaim cloud waste. - - more_info: | - **Example Pulumi Neo prompts:** - - *“What are my least used, most expensive resources?”* - - *“What are my top 10 most expensive cloud resources?”* - - *“How much did my cloud costs increase month over month – and what team was responsible for driving them upwards?”* - - - title: Stay secure - description: | - Pulumi Neo leverages knowledge about security best practices by combining Pulumi’s supergraph and cloud skills. - - more_info: | - **Example Pulumi Neo prompts:** - - *“Do I have any insecure endpoints open to the Internet?”* - - *“Do any of my S3 buckets have public-read access? If yes, help me make them private.”* - - *“Do you see any anomalous activity within the past 48 hours?”* - - - title: Debug cloud failures - description: | - Pulumi Neo can access history, logs, and runtime metrics so you can easily get answers about what is failing and why. - - more_info: | - **Example Pulumi Neo prompts:** - - *“Why did my deployment yesterday fail?”* - - *“We had an outage Thursday evening around 11pm. Do you understand why?”* - - *“I can’t access my EC2 instance i-3f8e over the Internet, why?”* - - header: Team Management - tabid: management-select - image: /images/product/pulumi-cloud-access.png - details: - - title: Set up identity and access controls - description: | - Integrate SSO and your [identity provider](/docs/administration/access-identity/scim/) with Pulumi, set [user permissions](/docs/administration/organizations-teams/teams/) for each stack, and track user activity with [audit logs](/docs/pulumi-cloud/audit-logs/). - - more_info: | - Single sign-on with any [SAML 2.0](/docs/administration/access-identity/saml/) identity provider like Azure Active Directory, Google Workspace, Okta, and OneLogin. - - Manage Pulumi access from your central identity provider via [SCIM 2.0 integration](/docs/administration/access-identity/scim/). - - Set [role-based access controls](/docs/administration/organizations-teams/teams/) that limit who can access infrastructure. - - Track the activity of users within your organization with [audit logs](/docs/pulumi-cloud/audit-logs/). - - title: Collaborate better within teams - description: | - Add teammates to Pulumi so you can work on projects together, ship code collaboratively, and coordinate changes to infrastructure. - - more_info: | - Invite new team members and share projects to collaborate on infrastructure. - - View [timelines](/docs/platform/projects-and-stacks/#stack-activity) that show diffs of changed resources and who made the changes. - - [Tag stacks](/docs/concepts/stack/#stack-tags) for easier filtering and searching. - -open_source: - title: The easiest way to use Pulumi open source - image: /images/product/service-open-source-diagram.svg - description: | - Pulumi Cloud is a managed service for Pulumi IaC's open source CLI and SDK. It tracks your [infrastructure’s state](/docs/iac/concepts/state-and-backends/) and coordinates updates with the CLI, which creates or updates resources to reach your infrastructure’s [desired state](/docs/concepts/how-pulumi-works/). - - You can also use any cloud or on-premises storage to build and [run your own backend](/docs/iac/concepts/state-and-backends/#using-a-diy-backend). - -security: - title: Pulumi takes security seriously - image: /images/product/soc-aicpa.svg - description: | - Pulumi Cloud runs in an AWS VPC and our architecture follows industry best practices. All network communication is encrypted using TLS and Pulumi’s endpoints are only accessible via HTTPS. Your data is also encrypted at-rest and Pulumi is compliant with SOC 2 Type II. - -deployment: - title: Deployment options - items: - - title: SaaS - icon: rocketship - icon_color: violet - description: | - Use Pulumi Cloud without worrying about scaling, availability, fault tolerance, and concurrency. - - - title: Self-hosted - icon: program - icon_color: yellow - description: | - [Run Pulumi Cloud](/product/self-hosted/) in your on-premises or cloud environment and manage it yourself. - -pricing: - title: Pricing - description: | - Pulumi Cloud offers Editions for Individual, Team, Enterprise, and Business Critical. Support is available on Enterprise and Business Critical. You only pay for what you use, and there are free tiers available. - -get_started: - title: Get started today - description: | - Pulumi is open source and free to get started. Deploy your first stack today. ---- diff --git a/content/product/pulumi-deployments.md b/content/product/pulumi-deployments.md index 8fa6d958044f..73d4b0970fd6 100644 --- a/content/product/pulumi-deployments.md +++ b/content/product/pulumi-deployments.md @@ -34,7 +34,7 @@ benefits: description: | Pulumi Deployments makes it easier for you and engineers on your team to manage the entire lifecycle of infrastructure from provisioning to tear down. You can choose from different workflows such as GitHub pull request triggered deployments, stacks with time based automatic deletions, scheduled automations, and more. - You can also orchestrate custom workflows with [Automation API](/docs/using-pulumi/automation-api/) and offload the workflow execution to Pulumi Deployments instead of running the Automation API code locally yourself. Pulumi Deployments is a fully managed service with minimal setup and is available through [Pulumi Cloud](/product/pulumi-cloud/). + You can also orchestrate custom workflows with [Automation API](/docs/using-pulumi/automation-api/) and offload the workflow execution to Pulumi Deployments instead of running the Automation API code locally yourself. Pulumi Deployments is a fully managed service with minimal setup and is available through [Pulumi](/product/). preview: youtube_url: https://www.youtube.com/embed/v48U7CNWutc diff --git a/content/what-is/what-is-hashicorp-vault.md b/content/what-is/what-is-hashicorp-vault.md index c0f4c34bde24..a928c96d0847 100644 --- a/content/what-is/what-is-hashicorp-vault.md +++ b/content/what-is/what-is-hashicorp-vault.md @@ -8,7 +8,7 @@ page_title: "What is HashiCorp Vault?" --- ### What is HashiCorp Vault? -HashiCorp Vault is a tool for secure secrets management, essential for storing and safeguarding sensitive data like API keys and passwords. It's one of many options in the ecosystem of secrets and configuration management tools supported by [Pulumi ESC](https://www.pulumi.com/product/esc/). As the complexity of modern cloud infrastructure has grown, so has the need for robust and scalable secrets management solutions. Vault's integration with Pulumi ESC addresses this need by providing a secure, centralized platform for managing sensitive information across multiple cloud environments. By leveraging Vault's capabilities within Pulumi ESC and [Pulumi Cloud](https://www.pulumi.com/product/pulumi-cloud/) infrastructure as code solutions, developers can ensure that their cloud infrastructure is secure and compliant with best practices, even as the underlying systems, complexity and requirements evolve. +HashiCorp Vault is a tool for secure secrets management, essential for storing and safeguarding sensitive data like API keys and passwords. It's one of many options in the ecosystem of secrets and configuration management tools supported by [Pulumi ESC](https://www.pulumi.com/product/esc/). As the complexity of modern cloud infrastructure has grown, so has the need for robust and scalable secrets management solutions. Vault's integration with Pulumi ESC addresses this need by providing a secure, centralized platform for managing sensitive information across multiple cloud environments. By leveraging Vault's capabilities within Pulumi ESC and [Pulumi](https://www.pulumi.com/product/) infrastructure as code solutions, developers can ensure that their cloud infrastructure is secure and compliant with best practices, even as the underlying systems, complexity and requirements evolve. In this article, we'll cover the key features of [HashiCorp Vault](https://www.hashicorp.com/products/vault), why secret management is important and share the use cases of how Vault integrates into various cloud architectures, enhancing the security and management of sensitive data in complex cloud environments. diff --git a/content/what-is/what-is-platform-engineering.md b/content/what-is/what-is-platform-engineering.md index 30b3ec69ca42..b32603bcfc7e 100644 --- a/content/what-is/what-is-platform-engineering.md +++ b/content/what-is/what-is-platform-engineering.md @@ -162,7 +162,7 @@ Pulumi's solution for platform teams encompasses all of the key requirements des 1. The _developer control plane_ enables the simple and powerful user experience, allowing platform teams to meet the varying needs of different developers and development teams. The core infrastructure as code tool supports the languages that teams are already familiar with (including TypeScript, Python, Go, C#, Java, and YAML), and leverages the powerful ecosystems surrounding these languages (IDE support, linters, and test frameworks, for example). There's also support for internal developer portals like [AWS Proton](https://aws.amazon.com/proton/) and [Backstage](https://backstage.io). 2. _Integration and delivery_ is key to supporting automation as the default. This includes extensive integration with numerous CI/CD systems as well as Pulumi's own CI/CD offering, called [Pulumi Deployments](/product/pulumi-deployments/). The [Automation API](/automation/) makes it possible to embed IaC into application software, empowering teams to create reusable infrastructure workflows. -3. _Monitoring and logging_ provides the "full visibility on everything" that is a requirement for platform engineering, through support for and integration with leading monitoring, logging, and metric solutions. [Pulumi Insights](/product/pulumi-insights/) provides advanced search (including natural language search), analytics, and artificial intelligence (AI) into [Pulumi Cloud](/product/pulumi-cloud/) to provide actionable knowledge on cloud usage and cost optimizations. +3. _Monitoring and logging_ provides the "full visibility on everything" that is a requirement for platform engineering, through support for and integration with leading monitoring, logging, and metric solutions. [Pulumi Insights](/product/pulumi-insights/) provides advanced search (including natural language search), analytics, and artificial intelligence (AI) into [Pulumi](/product/) to provide actionable knowledge on cloud usage and cost optimizations. 4. _Security and identity_ ensure security is a foundational element. [Pulumi Policies](/docs/insights/policy/) provides policy-based controls---including remediation of policy violations---using the same general purpose programming languages that our core IaC offering supports. [Pulumi ESC](/product/esc) enables centralized access to secrets and configuration information. 5. Pulumi's robust provider ecosystem opens up access to a wide plethora of _resources_ to help ensure that all the necessary services, platforms, and offerings needed to build a well-architected design are available. diff --git a/layouts/partials/schema/utils/product-entities.html b/layouts/partials/schema/utils/product-entities.html index cf97569df135..ce4e864899d3 100644 --- a/layouts/partials/schema/utils/product-entities.html +++ b/layouts/partials/schema/utils/product-entities.html @@ -26,10 +26,10 @@ {{ $pulumiCloud := dict "@type" "SoftwareApplication" - "@id" "https://www.pulumi.com/product/pulumi-cloud/#software" + "@id" "https://www.pulumi.com/product/#software" "name" "Pulumi Cloud" "applicationCategory" "Cloud Management Platform" - "url" "https://www.pulumi.com/product/pulumi-cloud/" + "url" "https://www.pulumi.com/product/" "isPartOf" (dict "@type" "SoftwareApplication" "@id" "https://www.pulumi.com/product/#pulumi-platform" diff --git a/layouts/partials/schema/utils/related-content.html b/layouts/partials/schema/utils/related-content.html index 8ef9fbe6499b..90dc6ce89929 100644 --- a/layouts/partials/schema/utils/related-content.html +++ b/layouts/partials/schema/utils/related-content.html @@ -46,7 +46,7 @@ {{ if in $content "Pulumi Cloud" }} {{ $relatedContent = $relatedContent | append (dict "@type" "SoftwareApplication" - "@id" "https://www.pulumi.com/product/pulumi-cloud/#software" + "@id" "https://www.pulumi.com/product/#software" "name" "Pulumi Cloud" ) }} {{ end }} diff --git a/layouts/product/pulumi-cloud.html b/layouts/product/pulumi-cloud.html deleted file mode 100644 index 61f906a75015..000000000000 --- a/layouts/product/pulumi-cloud.html +++ /dev/null @@ -1,165 +0,0 @@ -{{ define "hero" }} - {{ partial "hero" (dict "title" .Params.title) }} -{{ end }} - -{{ define "main" }} - {{ $pageContext := . }} - - -
- {{ with .Params.overview }} -

{{ .title }}

-

{{ .description | markdownify }}

- {{ end }} -
-
-

- ✨ New - Pulumi Insights 2.0 - Import and Sync All Cloud Infrastructure: Get started now ✨ -

-
-
-
- -
-
- {{ range $section := .Params.products }} -
-

{{ $section.header }}

-
- {{ range $index, $subsection := $section.content }} - {{ $tabclass := "" }} - {{ $textClass := "" }} - {{ if eq $index 0 }} - {{ $tabclass = " border-violet-primary "}} - {{ $textClass = "text-violet-primary" }} - {{ end }} -
-
{{ $subsection.header }}
-
- {{ end }} -
- {{ range $index, $subsection := $section.content }} - {{ $tabclass := ""}} - {{ if not (eq $index 0) }} - {{ $tabclass = " hidden "}} - {{ end }} -
-

{{ $subsection.header }}

- {{ if $subsection.subheader }} - - {{ end }} - {{ partial "fingerprinted-img.html" (dict "src" $subsection.image "alt" $subsection.header) }} - -
    - {{ $listLength := len $subsection.details }} - {{ range $index, $item := $subsection.details }} - {{ $itemClass := "border-t-2" }} - {{ if eq (add $index 1) $listLength }} - {{ $itemClass = "border-t-2 border-b-2" }} - {{ end }} - - -
  • - {{ partial "accordian-header" (dict "text" $item.title) }} -

    {{ $item.description | markdownify }}

    - -
    -

    {{ $item.more_info | markdownify }}

    -
    -
  • - {{ end }} -
-
- {{ end }} -
- {{ end }} -
-
- -
- {{ with .Params.open_source }} -

{{ .title }}

-
{{ .description | markdownify }}
- {{ partial "fingerprinted-img.html" (dict "src" .image "alt" "Pulumi Open Source" "class" "mx-auto") }} - {{ end }} -
- -
-
- {{ with .Params.security }} -

{{ .title }}

-

{{ .description | markdownify }}

- {{ partial "fingerprinted-img.html" (dict "src" .image "alt" "Pulumi Open Source" "class" "mx-auto") }} - {{ end }} -
-
- -
-
-

{{ .Params.case_studies.title }}

-
- {{ range .Params.case_studies.items }} -
-
-
{{ partial "customer-logo.html" (dict "logo" .logo) }}
-
{{ .name }}
-

{{ .description | markdownify }}

- -
-
- {{ end }} -
-
-
- -
-

{{ .Params.deployment.title }}

-
- {{ range $item := .Params.deployment.items }} -
-
-
- {{ partial "color-icon.html" (dict "icon" $item.icon "icon_color" $item.icon_color) }} -
-
-
{{ $item.title }}
-
-
-

{{ $item.description | markdownify }}

-
-
-
- {{ end }} -
-
- -
- {{ with .Params.pricing }} -

{{ .title }}

-

{{ .description | markdownify }}

-
- Pricing -
- {{ end }} -
- -
-
-
- -

{{ .Params.get_started.title }}

-

{{ .Params.get_started.description }}

- -
-
-
-{{ end }} diff --git a/theme/src/ts/main.ts b/theme/src/ts/main.ts index 65efb85fbeb2..23526a2a642c 100644 --- a/theme/src/ts/main.ts +++ b/theme/src/ts/main.ts @@ -17,7 +17,6 @@ import "./code-snippets-dropdown"; import "./resources"; import "./packages"; import "./pricing-trial"; -import "./pulumi-cloud"; import "./developer-advocates"; import "./toc"; import "./docs-main"; diff --git a/theme/src/ts/pulumi-cloud.ts b/theme/src/ts/pulumi-cloud.ts deleted file mode 100644 index 1637b8e63a3c..000000000000 --- a/theme/src/ts/pulumi-cloud.ts +++ /dev/null @@ -1,33 +0,0 @@ -document.addEventListener("DOMContentLoaded", function () { - const productTabs = ["iac-select", "esc-select", "insights-select"]; - const capabilityTabs = ["crossguard-select", "deployments-select", "neo-select", "management-select"]; - - productTabs.forEach(tab => { - document.getElementById(tab)?.addEventListener("click", function () { - productTabs.forEach(id => { - if (id !== tab) { - document.getElementById(id + "-content")?.classList.add("hidden"); - document.getElementById(id)?.classList.remove("border-violet-primary"); - document.getElementById(id + "-text")?.classList.remove("rainbow-text"); - } - }); - document.getElementById(tab)?.classList.add("border-violet-primary"); - document.getElementById(tab + "-text")?.classList.add("rainbow-text"); - document.getElementById(tab + "-content")?.classList.remove("hidden"); - }); - }); - capabilityTabs.forEach(tab => { - document.getElementById(tab)?.addEventListener("click", function () { - capabilityTabs.forEach(id => { - if (id !== tab) { - document.getElementById(id + "-content")?.classList.add("hidden"); - document.getElementById(id)?.classList.remove("border-violet-primary"); - document.getElementById(id + "-text")?.classList.remove("rainbow-text"); - } - }); - document.getElementById(tab)?.classList.add("border-violet-primary"); - document.getElementById(tab + "-text")?.classList.add("rainbow-text"); - document.getElementById(tab + "-content")?.classList.remove("hidden"); - }); - }); -});