Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
82 commits
Select commit Hold shift + click to select a range
d6b2308
Removed SPOT from instance types
pgarousi Feb 25, 2026
246abab
Renamed section from Azure AD to Microsoft Entra ID
sgeistdensify Feb 25, 2026
8c01a58
Replaced references to Azure AD with Microsoft Entra ID
sgeistdensify Feb 25, 2026
8ec58be
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
3c1733a
Renaming of Azure AD to Microsoft Entra ID
sgeistdensify Feb 25, 2026
6586d5d
Renamed additional Azure AD entries to Microsoft Entra ID
sgeistdensify Feb 25, 2026
43d4bcb
Update Configuring_External_User_Authentication.mdx
sgeistdensify Feb 25, 2026
c4d2902
Update Configuring_External_User_Authentication.mdx
sgeistdensify Feb 25, 2026
c0751fa
Merge branch 'main' of https://github.com/densify-dev/densify-docs
sgeistdensify Feb 25, 2026
760994b
Update Configuring_External_User_Authentication.mdx
sgeistdensify Feb 25, 2026
98e8ac3
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
a37fd5e
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
27935d3
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
cb27252
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
67023f8
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
3417bd4
Update External_User_Authentication_Example_Configuration_for_Azure_A…
sgeistdensify Feb 25, 2026
59de472
Update Configuring_External_User_Authentication.mdx
sgeistdensify Feb 25, 2026
d5310c5
Update External_User_Authentication_Example_Configuration_for_Google_…
sgeistdensify Feb 25, 2026
08c0b69
Update External_User_Authentication_Example_Configuration_for_Google_…
sgeistdensify Feb 25, 2026
cf2545b
Update External_User_Authentication_Example_Configuration_for_Okta.mdx
sgeistdensify Feb 25, 2026
a6e0964
Update Configuring_External_User_Authentication.mdx
sgeistdensify Feb 25, 2026
c743037
Enhanced onboarding documentation
pgarousi Feb 26, 2026
612720c
Removed webhook references in delete cloud connection
pgarousi Feb 27, 2026
f74e9ca
Merge pull request #24 from densify-dev/dev
pgarousi Mar 2, 2026
ae0ab56
Update Configuring_External_User_Authentication.mdx
sgeistdensify Mar 11, 2026
b1dfe0d
Adding release notes for 4.2.0
Mar 12, 2026
de2f0b7
Releaes notes 4.2 - Kubernetes Dashboard
Mar 12, 2026
26b7ba5
Releae notes 4.2
Mar 12, 2026
dfdc44a
new kubex dasboard page + reordering
amitjohry Mar 12, 2026
cf04bee
new kubex dashboard page
amitjohry Mar 12, 2026
d80ea12
Merge branch 'Kubex-4.2' of https://github.com/densify-dev/densify-do…
amitjohry Mar 12, 2026
ec2095f
Release notes for Cloud Densify 4.2
Mar 12, 2026
2d1ed84
Release Notes for Kubex 4.2
Mar 12, 2026
d0aa822
Merge branch 'Kubex-4.2' of https://github.com/densify-dev/densify-do…
Mar 12, 2026
38bdb6e
Release Notes 4.2
Mar 12, 2026
3b4001e
Release Notes 4.2
Mar 12, 2026
61ce3b5
Release notes 4.2
Mar 13, 2026
8a78a6c
Release Notes 4.2
Mar 13, 2026
4731348
updates to the container tab
amitjohry Mar 13, 2026
febb13b
Merge branch 'Kubex-4.2' of https://github.com/densify-dev/densify-do…
amitjohry Mar 13, 2026
9680dd9
syntax fix
amitjohry Mar 13, 2026
ddd1c21
rearranging container pages layout
amitjohry Mar 13, 2026
76bcb23
rearranging container menu layout
amitjohry Mar 13, 2026
419a129
UPdates to headers
amitjohry Mar 13, 2026
f815ddd
Merge pull request #25 from densify-dev/Kubex-4.2
amitjohry Mar 13, 2026
6fd41bf
user mgmt pages
amitjohry Mar 17, 2026
c73350b
user mgmt pages
amitjohry Mar 17, 2026
1c13645
user mgmt
amitjohry Mar 17, 2026
255884a
user mgmt
amitjohry Mar 17, 2026
c11cb91
user mgmt page
amitjohry Mar 17, 2026
c286f1b
minor heading changes
amitjohry Mar 17, 2026
7fc0144
minor heading changes
amitjohry Mar 17, 2026
d799944
minor text updates
amitjohry Mar 17, 2026
3be82cb
Merge pull request #26 from densify-dev/Kubex-4.2
amitjohry Mar 17, 2026
da7a369
updates to SSO
amitjohry Mar 17, 2026
6eaa241
Merge pull request #27 from densify-dev/Kubex-4.2
amitjohry Mar 17, 2026
e2e5b1e
relabelling figure
amitjohry Mar 18, 2026
fd27bdf
Merge pull request #28 from densify-dev/Kubex-4.2
amitjohry Mar 18, 2026
c7bcf7d
added cpu throttling
amitjohry Mar 19, 2026
73b22ab
Merge branch 'main' of https://github.com/densify-dev/densify-docs
amitjohry Mar 19, 2026
5257658
Update AWS_Data_Collection_Using_a_CloudFormation_Template.mdx
sgeistdensify Mar 30, 2026
6c3b3c7
Update AWS_Data_Collection_Prerequisites_for_an_IAM_Role__CloudWatch_…
sgeistdensify Apr 15, 2026
00fecc4
Update AWS_Data_Collection_Prerequisites_for_an_IAM_Role__CloudWatch_…
sgeistdensify Apr 15, 2026
3056c88
Update AWS_Data_Collection_Prerequisites_for_an_IAM_Role__CloudWatch_…
sgeistdensify Apr 15, 2026
147c858
Updated Policy Reference Guide pdf link and added policies pfd file
Apr 27, 2026
feb2231
Updated pdf file name
Apr 27, 2026
11199eb
Policy guide is pointing to S3 bucket
Apr 28, 2026
7f87d86
Add OCI data collection page
jlondon-densify Apr 30, 2026
b1c2121
Syntax fix
jlondon-densify Apr 30, 2026
96bf402
v4.4 Release notes
Apr 30, 2026
5779cae
B
Apr 30, 2026
2eba28d
4.4 Release notes
Apr 30, 2026
80d2394
4.4 Release notes
Apr 30, 2026
932629a
4.4 Release notes
Apr 30, 2026
0b98c4c
4.4 Release notes
Apr 30, 2026
e959f6b
4.4 Release notes
Apr 30, 2026
a85e947
Ephemeral Storage
Apr 30, 2026
cdfffbc
Ephemeral Storage
Apr 30, 2026
5cc3738
4.4 Release notes
Apr 30, 2026
147ad82
OCI data collection updates
jlondon-densify May 1, 2026
2a9d8ca
Merge branch 'Kubex-4.4' of https://github.com/densify-dev/densify-do…
jlondon-densify May 1, 2026
d6b7ba8
Merge pull request #29 from densify-dev/Kubex-4.4
jlondon-densify May 1, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -10,40 +10,12 @@ The `/analysis/cloud/aws/analyze` resource is used to collect AWS CloudWatch da
* Subsequent analysis is scheduled to run on a nightly basis after the completion of data collection.
* Optionally, you can configure the results to be sent to a webhook URI upon analysis completion. See [Add webhook to an analysis](./Analysis_Webhook#_AddWebhook) for details.

3. While data collection or analysis is in progress, you can check the status (using `/analysis/AWS/<``subscriptionId``>/status` resource) or wait for the results to be published to an optional webhook URI.
3. Once data collection succeeds and an `analysisId` is created for the account, you can check progress with `/analysis/cloud/aws/<analysisId>/status` or wait for the results to be published to an optional webhook URI. Accounts that have not produced an `analysisId` (for example, due to unsupported resources or insufficient data) cannot use the status endpoint until an analysis run begins.
4. The reporting database update is scheduled to run automatically on a nightly basis after the completion of the analysis. This process produces reports for each instance recommendation, which is useful for analysts or application owners. These reports are only created after the scheduled analysis is completed, and may therefore only be available on the following day for a new analysis. Exact timing depends on the size of your environment.

### Ad-Hoc Tasks

Generally you do not need to run once-off tasks as both data collection and analysis tasks are scheduled automatically. In cases where you need make an ad-hoc request in addition to the scheduled job, the functionality exists for this endpoint.

#### Historical Data Collection

When Kubex initiates data collection, normally audits collect only the last 24 hours of data. You can optionally collect up to 60 days of historical data. The historical data provides a more representative set of data on which to base resizing and optimization recommendations. You can run an ad-hoc task to collect the historical data.

<Note>
Collection of historical data can take a significant amount of time, depending on the number of instances from which Kubex is collecting data. Contact [support@kubex.ai](mailto:support@kubex.ai) to enable historical data collection and details of the performance impact.
When onboarding an account using the `/analysis/cloud/aws/analyze` endpoint, receiving a 200 status code signals that the onboarding was successful.
</Note>

The following settings define the range of historical data to be collected:

* Start date offset--This is number of days from the 60-day maximum, used to define the start of the range.

These extra API parameters allow you to reduce the number of days of historical data to be collected. If, for example, the daily audit has been running for a few days before the historical audit can be executed then you can set the end offset to exclude the number of days that have already been collected. Sixty days is the maximum number of days that you can go back and collect historical data.

* End date offset--This is number of days from yesterday, to end the range of data collected.

<Accordion title="Figure: Adjusting Historical Range Using Start and End Dates">
<Frame>![](/images/docs-api/WebHelp_Densify_API_Cloud/Content/Resources/Images/CiRBA_API_Guide/03000025_356x218.png)</Frame>
</Accordion>


A connection to the specified cloud account must already exist before you can run an ad hoc audit. When you execute an ad hoc refresh an audit task will be configured but a new connection will not be created. If the cloud connection does not already exist and the API POST contains `triggerAdhocAudit=true`, then you will get an error message.

If there is more than one account associated with the specified account ID (i.e. a payer account with many linked accounts), the Kubex API handles it in the same way that analyses are currently rerun using the POST operation.

Once the audit is complete you need to rerun the associated analyses as indicated below or you can wait for the next scheduled execution of the analyses and RDB populate.

#### Analysis Update

You can make an ad-hoc request to refresh an existing analysis, outside of the scheduled nightly run using `/analysis/cloud/<aws|azure|gcp>/analyze`. This manual, ad hoc analysis request does not perform data collection or reporting database (RDB) updates. It only runs the analysis on the existing data collected with the following behavior:
Expand All @@ -70,9 +42,9 @@ Before you can collect AWS CloudWatch data, you need to create an IAM role for
## Endpoints

<CardGroup cols={2}>
<Card title="Analyze Aws" href="/docs-api/WebHelp_Densify_API_Cloud/Content/API_Guide/Analysis_AWS_Analyze/analyzeAws" arrow/>
<Card title="Analyze AWS" href="/docs-api/WebHelp_Densify_API_Cloud/Content/API_Guide/Analysis_AWS_Analyze/analyzeAws" arrow/>
</CardGroup>

<CardGroup cols={2}>
<Card title="List Aws Analyses" href="/docs-api/WebHelp_Densify_API_Cloud/Content/API_Guide/Analysis_AWS_Analyze/listAwsAnalyses" arrow/>
<Card title="List AWS Analyses" href="/docs-api/WebHelp_Densify_API_Cloud/Content/API_Guide/Analysis_AWS_Analyze/listAwsAnalyses" arrow/>
</CardGroup>
Original file line number Diff line number Diff line change
Expand Up @@ -8,36 +8,15 @@ The `/analysis/azure/analyze` resource is used to collect Microsoft Azure infra
2. Initiate analysis on the data collected using the default policy.
* Subsequent analysis is scheduled to run on a nightly basis after the completion of data collection.
* Optionally, you can configure the results to be sent to a webhook URI upon analysis completion. See [Add webhook to an analysis](./Analysis_Webhook#_AddWebhook) for details.
3. While data collection or analysis is in progress, you can check the status (using `/analysis/azure/<``subscriptionId``>/status` resource) or wait for the results to be published to an optional webhook URI.
3. Once data collection succeeds and an `analysisId` is created for the subscription, you can track progress with `/analysis/cloud/azure/<analysisId>/status` or wait for the results to be published to an optional webhook URI. Subscriptions that have not produced an `analysisId` (for example, unsupported resources or insufficient data) cannot use the status endpoint until an analysis run begins.
4. The reporting database update is scheduled to run automatically on a nightly basis after the completion of the analysis. This process produces reports for each instance recommendation, which is useful for analysts or application owners. These reports are only created after the scheduled analysis is completed, and may therefore only be available on the following day for a new analysis. Exact timing depends on the size of your environment.

The `/analysis/cloud/azure` resource is also used to return a list of Microsoft Azure optimization analyses currently in Kubex.

### Ad-Hoc Tasks

Generally you do not need to run once-off tasks as both data collection and analysis tasks are scheduled automatically. In cases where you need make an ad-hoc request in addition to the scheduled job, the functionality exists for this endpoint.

#### Historical Data Collection

When Kubex initiates data collection, normally audits collect only the last 24 hours of data. You can optionally collect up to 30 days of historical data. The historical data provides a more representative set of data on which to base resizing and optimization recommendations. You can run an ad-hoc task to collect the historical data.

<Note>
Collection of historical data can take a significant amount of time, depending on the number of instances from which Kubex is collecting data. Contact [support@kubex.ai](mailto:support@kubex.ai) to enable historical data collection and details of the performance impact.
When onboarding a subscription using the `/analysis/cloud/azure/analyze` endpoint, receiving a 200 status code signals that the onboarding was successful.
</Note>

The `/analysis/cloud/azure` resource is also used to return a list of Microsoft Azure optimization analyses currently in Kubex.

The following settings define the range of historical data to be collected:

* Start date offset--This is the number of days from the 30-day maximum, used to define the start of the range.
* End date offset--This is number of days from yesterday, to end the range of data collected.

These parameters allow you to reduce the number of days of historical data to be collected. If, for example, the daily audit has been running for a few days before the historical audit can be executed then you can set the end offset to exclude the number of days that have already been collected. Thirty days is the maximum number of days that you can go back and collect historical data for Azure and GCP environments.

A connection to the specified cloud account must already exist before you can run an ad hoc audit. When you execute an ad hoc refresh an audit task will be configured but a new connection will not be created. If the cloud connection does not already exist and the API POST contains `triggerAdhocAudit=true`, then you will get an error message.

If there is more than one account associated with the specified account ID (i.e. a payer account with many linked accounts), the Kubex API handles it in the same way that analyses are currently rerun using the POST operation.

Once the audit is complete you need to rerun the associated analyses as indicated below or you can wait for the next scheduled execution of the analyses and RDB populate.

#### Analysis Update

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,34 +14,13 @@ The `/analysis/gcp/analyze` resource is used to collect Google Cloud Platform i
* Subsequent analysis is scheduled to run on a nightly basis after data collection.
* You can optionally configure the results to be sent to a webhook URI upon analysis completion. See [Add webhook to an analysis](./Analysis_Webhook#_AddWebhook) for details.

3. While data collection or analysis is in progress, you can check for status (using `/analysis/gcp/<``projectId``>/status` resource) or wait for the results to be published to an optional webhook URI.
3. Once data collection succeeds and an `analysisId` is created for the project, you can check progress via `/analysis/cloud/gcp/<analysisId>/status` or wait for the results to be published to an optional webhook URI. Projects that do not yet have an `analysisId` (for example, unsupported resources or insufficient data) must wait for an analysis run before the status endpoint becomes available.
4. The reporting database update is scheduled to run automatically on a nightly basis after the completion of the analysis. This process produces reports for each instance recommendation, which is useful for analysts or application owners. These reports are only created after the scheduled analysis is completed, and may therefore only be available on the following day for a new analysis. Exact timing depends on the size of your environment.

### Ad-Hoc Tasks

Generally you do not need to run once-off tasks as both data collection and analysis tasks are scheduled automatically. In cases where you need make an ad-hoc request in addition to the scheduled job, the functionality exists for this endpoint.

#### Historical Data Collection

When Kubex initiates data collection, normally audits collect only the last 24 hours of data. You can optionally collect up to 30 days of historical data. The historical data provides a more representative set of data on which to base resizing and optimization recommendations. You can run an ad-hoc task to collect the historical data.

<Note>
Collection of historical data can take a significant amount of time, depending on the number of instances from which Kubex is collecting data. Contact [support@kubex.ai](mailto:support@kubex.ai) to enable historical data collection and details of the performance impact.
When onboarding a project using the `/analysis/cloud/gcp/analyze` endpoint, receiving a 200 status code signals that the onboarding was successful.
</Note>

The following settings define the range of historical data to be collected:

* Start date offset--This is the number of days from the 30-day maximum, used to define the start of the range.
* End date offset--This is number of days from yesterday, to end the range of data collected.

These parameters allow you to reduce the number of days of historical data to be collected. If, for example, the daily audit has been running for a few days before the historical audit can be executed then you can set the end offset to exclude the number of days that have already been collected. Thirty days is the maximum number of days that you can go back and collect historical data for Azure and GCP environments.

A connection to the specified cloud account must already exist before you can run an ad hoc audit. When you execute an ad hoc refresh an audit task will be configured but a new connection will not be created. If the cloud connection does not already exist and the API POST contains `triggerAdhocAudit=true`, then you will get an error message.

If there is more than one account associated with the specified account ID (i.e. a payer account with many linked accounts), the Kubex API handles it in the same way that analyses are currently rerun using the POST operation.

Once the audit is complete you need to rerun the associated analyses as indicated below or you can wait for the next scheduled execution of the analyses and RDB populate.

#### Analysis Update

You can make an ad-hoc request to refresh an existing analysis, outside of the scheduled nightly run using `/analysis/cloud/<aws|azure|gcp>/analyze`. This manual, ad hoc analysis request does not perform data collection or reporting database updates. It only runs the analysis on the existing data collected with the following behavior:
Expand Down
2 changes: 1 addition & 1 deletion docs-kubex/Content/Cloudex/Catalog_Map_Tab.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ import { ImageCard } from "/snippets/ImageCard.mdx";

The Kubex catalog map allows you to view a range of recommended instance type options for public cloud instances. The map view shows the AWS or Azure catalog scores for the selected instance.
<Note>
**Note:** The catalog map is **not** currently available for ASGs, VM Scale Sets or GCP cloud instances.
**Note:** The catalog map is **not** currently available for ASGs, VM Scale Sets, GCP CE Instances or OCI Instances.
</Note>

Filters allow you to limit the catalog based on items such as processor type, processor features and instance cost.
Expand Down
21 changes: 20 additions & 1 deletion docs-kubex/Content/Cloudex/Cloud_Connections.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -34,13 +34,22 @@ Before creating a connection you need to grant access to Kubex so that it can co
<a href="/docs/WebHelp_Densify_Cloud/Content/Data_Collection_for_Public_Cloud_Systems/AWS_Data_Collection_Prerequisites_for_an_IAM_Role__CloudWatch_only_">
AWS Data Collection Using IAM Roles Prerequisites
</a>
.
</li>
<li>
<a href="/docs/WebHelp_Densify_Cloud/Content/Data_Collection_for_Public_Cloud_Systems/Microsoft_Azure_Data_Collection_Prerequisites_for_a_Service_Principal">
Microsoft Azure Data Collection Prerequisites
</a>
</li>
<li>
<a href="/docs/WebHelp_Densify_Cloud/Content/Data_Collection_for_Public_Cloud_Systems/Google_Cloud_Platform_Data_Collection_Prerequisites">
Google Cloud Platform Data Collection Prerequisites
</a>
</li>
<li>
<a href="/docs/WebHelp_Densify_Cloud/Content/Data_Collection_for_Public_Cloud_Systems/Oracle_Cloud_Infrastructure_Data_Collection_Prerequisites">
Oracle Cloud Infrastructure Data Collection Prerequisites
</a>
</li>
</ul>


Expand All @@ -58,6 +67,16 @@ Once you have completed the prerequisites you can create the connections using t
Creating Azure Cloud Connections
</a>
</li>
<li>
<a class="MCXref xref" href="/docs-kubex/Content/Cloudex/Data_Collection_GCP_Connections">
Creating GCP Cloud Connections
</a>
</li>
<li>
<a class="MCXref xref" href="/docs-kubex/Content/Cloudex/Data_Collection_OCI_Connections">
Creating OCI Cloud Connections
</a>
</li>
</ul>


Expand Down
87 changes: 87 additions & 0 deletions docs-kubex/Content/Cloudex/Data_Collection_GCP_Connections.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
---
title: "Connecting GCP to Kubex"
sidebarTitle: "Connecting GCP to Kubex"
---

Kubex uses an API-Key user to access your Google Cloud Platform (GCP) project. See [Google Cloud Platform Data Collection Prerequisites](/docs/WebHelp_Densify_Cloud/Content/Data_Collection_for_Public_Cloud_Systems/Google_Cloud_Platform_Data_Collection_Prerequisites) for details on configuring the API-Key user and obtaining the required credentials.

## Configuring GCP Connections

<ol start="1">
<li>
Click the **Add** button and select GCP.
<Frame caption="Figure: Accessing the Add Button">
<img src="/images/docs-kubex/Content/Cloudex/add_cloud_connection.png"/>
</Frame>
</li>
<li>
Enter the GCP-specific connection parameters.
<Frame caption="Figure: GCP Connection Window">
<img src="/images/docs-kubex/Content/Cloudex/add_gcp_connection.png"/>
</Frame>
<Accordion title="Table: GCP Connection Parameters">
<table style={{ width: "100%", borderCollapse: "collapse" }}>
<colgroup>
<col style={{ width: "30%" }} />
<col style={{ width: "70%" }} />
</colgroup>
<thead>
<tr>
<th style={{ verticalAlign: "middle" }}>Field</th>
<th style={{ verticalAlign: "middle" }}>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td style={{ verticalAlign: "middle" }}>Service Account Key File</td>
<td style={{ verticalAlign: "middle" }}>
The JSON key file for the service account you created in GCP for Kubex data collection.
</td>
</tr>
<tr>
<td style={{ verticalAlign: "middle" }}>Client ID</td>
<td style={{ verticalAlign: "middle" }}>
The client ID for the service account you created in GCP for Kubex data collection. This is auto filled when you upload the service account key file.
</td>
</tr>
<tr>
<td style={{ verticalAlign: "middle" }}>Client Email</td>
<td style={{ verticalAlign: "middle" }}>
The client email for the service account you created in GCP for Kubex data collection. This is auto filled when you upload the service account key file.
</td>
</tr>

</tbody>
</table>
</Accordion>
</li>
<li>
Verify your connection by clicking the **Verify Connection** button.
<ul>
<li class="ListBullet">
If the credentials are valid, you will be connected and authenticated.
</li>
<li class="ListBullet">
If the credentials cannot be validated, then review the displayed error message and correct your credentials. See <a href="/docs/WebHelp_Densify_Cloud/Content/Data_Collection_Troubleshooting/GCP_Cloud_Connections">Troubleshooting GCP Cloud Connections</a> for details.
</li>
</ul>
</li>
<li>
Once the account is verified, the available projects that are associated with the service account are listed. Select the projects that you want to include in this connection and click **Next**.
</li>
<Frame caption="Figure: Select GCP Project Window">
<img src="/images/docs-kubex/Content/Cloudex/select_gcp_connection.png"/>
</Frame>
<li>
Review the connection details and add a name for your connection. Click **Save** to save the connection.
</li>
<Frame caption="Figure: Save GCP Connection Window">
<img src="/images/docs-kubex/Content/Cloudex/save_gcp_connection.png"/>
</Frame>


<li>
If you want to connect another tenancy, click **Add** and repeat these steps to configure the connection.
</li>
</ol>

Loading