diff --git a/content/case-studies/_index.md b/content/case-studies/_index.md index ac7d60bd7ae4..b662dce0b029 100644 --- a/content/case-studies/_index.md +++ b/content/case-studies/_index.md @@ -51,5 +51,6 @@ customer_logos: - name: portx - name: tivityhealth - name: linktree + - name: spearAI --- diff --git a/content/case-studies/spear-ai.md b/content/case-studies/spear-ai.md new file mode 100644 index 000000000000..37534585b3d5 --- /dev/null +++ b/content/case-studies/spear-ai.md @@ -0,0 +1,152 @@ +--- +title_tag: Spear AI | Case Studies +title: "Spear AI: Achieving Government ATO in 3 Months" +description: | + Defense tech startup accelerates compliance timelines to bring capabilities to market up to 6x faster while enabling rapid deployment across air-gapped cloud and edge environments. +meta_desc: Learn how Spear AI used Pulumi to achieve government Authorization to Operate in 3 months. + +customer_name: Spear AI +customer_logo: /logos/customers/spearAI.svg +customer_url: https://www.spear.ai/ + +quote_block: + quote: | + “We gave our auditors access to our policy packs because it’s far easier to understand and prove controls in code than in docs and diagrams. With Pulumi’s Policy as Code approach, that manual review process has gone away. We’ve reduced our Authority to Operate (ATO) timeline from a year and a half to expecting approval in three months.” Michael Hunter, CEO, Spear AI + quote_attrib: Michael Hunter, CEO, Spear AI + headline_stat: 6x faster time to achieve ATO + +exec_summary: | + Spear AI delivers cutting-edge AI solutions that accelerate mission-critical decision-making for defense operators. By transforming how tactical sensor data is processed and analyzed, Spear AI enhances situational awareness and operational capacity across edge and cloud environments. The company specializes in automated data labeling and intelligent model deployment for complex sensor systems, enabling the US Navy to maintain tactical superiority through faster, more informed decisions in dynamic operational environments. + + The Spear AI engineering team faced several challenges in bringing these advanced capabilities to market, including deploying and managing resources at multiple clearance levels, ranging from AWS commercial cloud to GovCloud, air-gapped AWS Top Secret Cloud, and even hardware at sea. They chose Pulumi to help bring their capabilities to market quickly, leveraging its infrastructure as code and policy-enforcement capabilities that work across all these use cases. By adopting Pulumi, the team was able to quickly stand up development environments, deploy services that comply with AWS Secret Cloud restrictions, and achieve Authorization to Operate (ATO) in 3 months – a process that can take up to 24 months to meet stringent defense requirements. + + By partnering with Pulumi, the Spear AI team is pioneering the future of defense infrastructure: demonstrating how modern platform engineering will transform government technology delivery. + +sections: + - label: Exec Summary + anchor: executive-summary + - label: Challenge + anchor: challenge-military-grade-infrastructure-at-the-speed-of-ai + - label: Solution + anchor: solution-infrastructure-as-code-with-built-in-governance + - label: Architecture + anchor: architecture-reproducible-environments-from-cloud-to-submarine + - label: Results + anchor: results-transforming-government-compliance-through-code + - label: Technical Implementation + anchor: technical-implementation-modern-development-workflows + - label: Looking Forward + anchor: looking-forward-infrastructure-for-national-security-innovation + - label: About Spear AI + anchor: about-spear-ai +--- + +## Challenge: Military-grade Infrastructure at the Speed of AI + +As an innovator in the defense technology space, Spear AI faced a unique infrastructure challenge that would test the limits of traditional tooling: they needed to build infrastructure that could operate on standard AWS cloud services for development, the classified air-gapped AWS Secret Cloud for government operations, and manage edge deployments on nuclear submarines. These are daunting requirements for any organization, let alone a seed-stage startup. + +The traditional path to government Authorization to Operate (ATO) certification, a mandatory cybersecurity process for Department of Defense contractors, typically takes 6 to 24 months of manual documentation, security testing, remediation, and review. "The accreditation process with the government is intense," explains Michael Hunter, co-founder and CEO at Spear AI. "The first part consists of an architecture review, and the second part involves demonstrating security controls. The traditional process involved reviewing templates line by line, implementing tests, and creating architectural diagrams. Then, auditors go through architecture diagrams and the cloud console to click around to see if the diagram matches the implementation." + +For a fast-moving startup, this timeline and manual process posed a bottleneck that could derail their ability to get their product to market and serve government customers. Instead of adopting a lengthy, manual process, the team sought to accelerate time to market by applying preventive policies and state management to demonstrate compliance in a verifiable, automated way. + +## Solution: Infrastructure as Code with Built-in Governance + +After evaluating legacy infrastructure approaches and next-generation solutions, Spear AI selected Pulumi as the only platform capable of meeting both defense-grade security requirements and delivering startup speed. + +"We specifically liked the guardrails that Pulumi policy capabilities provided," Michael notes. "We were very attracted to the idea of writing infrastructure in TypeScript and using all the benefits of modern languages. We wanted to try something new as we had a lot of bad experiences with template-driven tools like Terraform." + +Dennis Torres, VP of Software, says: "CDK isn't portable - if you want to deploy to non-AWS environments like submarines, it's not really the right tool. With Terraform's HCL, it's hard to use and tends to grow out of control unless you're very diligent about splitting things into modules." + +The team implemented a comprehensive infrastructure strategy using: + +- [Pulumi Infrastructure as Code](https://www.pulumi.com/docs/iac/) for multi-environment deployments +- [Policy as Code](https://www.pulumi.com/docs/support/faq/policies/) for automated compliance verification +- [Pulumi ESC](https://www.pulumi.com/product/secrets-management/) for secrets and configuration management +- [Review Stacks](https://www.pulumi.com/docs/deployments/deployments/review-stacks/) for rapid development environment provisioning and cost management +- [Kubernetes](https://www.pulumi.com/registry/packages/kubernetes/api-docs/) for portability across all deployment targets, from Amazon EKS to edge clusters + +## Architecture: Reproducible Environments from Cloud to Submarine + +Spear AI's infrastructure spans three critical environments, each with unique constraints: + +### 1. Development Environment (AWS Commercial Cloud) + +The Spear team uses Pulumi to manage standard AWS services for rapid iteration and testing, integrated with modern development workflows including GitHub Actions, Vercel deployments, and Neon database branching. + +### 2. Government Environments (AWS GovCloud, AWS Secret Cloud, AWS Top Secret Cloud) + +Production operates in regions ranging from GovCloud to the air-gapped AWS Secret Cloud environment and will also need to support Top Secret Cloud. These environments lack many standard services, such as Amazon SES (email), ACM (certificate management), and third-party APIs for AI/ML model serving. Spear AI uses Pulumi to rapidly provision custom services to replicate missing cloud functionality in this environment. + +### 3. Edge Deployments (Nuclear Submarines) + +On-premises Kubernetes environments make it easy to mirror cloud architectures at the edge. "If you think of a nuclear submarine, it's essentially a data center underwater," Michael explains. + +The unifying technology is EKS, chosen explicitly for its portability. "We're migrating everything to EKS to take advantage of the uniformity and portability that EKS enables," Dennis explains. "There's no ECS on a submarine—it's just easier for us to write a Kubernetes pod once and deploy it across all environments from sea to cloud," says Dennis. + +## Results: Transforming Government Compliance Through Code + +### 6x Faster Authority to Operate (ATO) + +The most dramatic result was the compression of government compliance timelines from an average of 18 months to 3 months. This acceleration came from Pulumi's ability to express security controls as code rather than traditional documentation and templates. + +"We gave our auditors access to our policy packs because it's far easier to understand and prove controls in code than in a bunch of docs and diagrams," Michael explains. "That process [of manual review] has gone away. We've gone down from a year and a half to expecting an ATO in three months." + +### Improved Code Readability and Review Speed + +The shift from Terraform HCL to TypeScript dramatically improved code review and audit processes. "When you look at a Pulumi stack, it's just easier to understand and grok versus Terraform HCL," Dennis notes. "HCL is far too verbose, which makes it hard for auditors to really understand how your proposed implementation works." + +This readability improvement directly impacts compliance review speed, as auditors can more easily verify security controls embedded in readable code rather than parsing complex domain-specific languages that can be 10 times more verbose. + +### Democratized Infrastructure Access + +By using familiar programming languages, Spear AI achieved infrastructure democratization across its engineering team. "It doesn't end up falling on any one person's plate—any engineer, if they need to make a change to the stack, can do so, even if they're not an infrastructure expert," Dennis explains. "The combination of modern languages and policy gives the team safety and control." + +This follows the same model as Docker's democratization effect: "Everyone can modify a Dockerfile and spin up their infrastructure in their local machine. If it works there, it will work in the cloud." + +### Rapid Service Provisioning + +The combination of Pulumi's development velocity and Review Stacks capabilities enables rapid experimentation. Dennis was able to "spin up new capabilities in less than a week," compared to estimates of "over a month" using traditional approaches. + +Michael provides a broader context: "We have one cloud engineer who has done the work of seven cloud engineers at a traditional government contractor that is not using Pulumi - and we're building comparable infrastructure in half the time." + +Pulumi's preview deployments integrate seamlessly with existing development workflows. "Having preview deployments trigger on pull request is a workflow that we're used to and was really difficult before with other infrastructure as code tools," Dennis explains. + +The team leverages this capability alongside other branch-based development tools: + +- Next.js applications with Vercel branch deployments +- Postgres databases with Neon branch deployments +- Infrastructure with Pulumi review stacks + +## Technical Implementation: Modern Development Workflows + +Learn more in the [Pulumi documentation](/docs/). + +### Policy as Code for Automated Compliance + +Pulumi's policy packs enable Spear AI to encode security requirements directly into its infrastructure deployment process. This ensures that every deployment can automatically prove compliance with government requirements, without manual review. + +### Secrets Management with Pulumi ESC + +"We're using ESC for config and for secrets," Dennis confirms. This avoids the common pitfall of "committing all the secrets to a repo," significantly improving security posture and collaboration workflows. + +### Developer Experience Benefits + +"It's fun to write Pulumi code," Dennis observes. "Because it's a programming language, you inherit all the benefits that you get from your programming language of choice: you get benefits like type completion." Now that the team is adopting LLM-powered code assistants like Anthropic Claude, they are finding that type completion is even more valuable. + +## Looking Forward: Infrastructure for National Security Innovation + +Spear AI's success with Pulumi establishes the new standard for defense technology delivery. This isn't just one company's success story: it's a blueprint that will fundamentally transform how government contractors approach infrastructure, compliance, and speed to mission. By pioneering infrastructure as code for the most demanding environments on Earth, Spear AI and Pulumi have proven that there's no trade-off between security and speed, between compliance and innovation. This approach will become the standard for any organization serious about both governance and velocity. + +This success establishes Pulumi as the platform enabling the next generation of defense technology companies. As AI and cloud-native approaches become mission-critical, the infrastructure platform that enables both speed and security will determine competitive advantage in national security. + +As Michael concludes, "The time from first commit to production code was lower than I was expecting. If I can do it, anybody on the team should be able to do it." + +## About Spear AI + +Spear AI is a defense technology startup building AI-powered solutions for government and military applications. They operate across multiple security environments, from commercial cloud to classified systems and edge deployments on naval vessels. + +--- + +Ready to accelerate your compliance timeline while maintaining security? + +[Start Free](https://app.pulumi.com/signup) | [Talk with an Expert](/contact/?form=request-a-demo) diff --git a/content/product/insights-governance.md b/content/product/insights-governance.md new file mode 100644 index 000000000000..581449a9af31 --- /dev/null +++ b/content/product/insights-governance.md @@ -0,0 +1,166 @@ +--- +title: Cloud Asset and Compliance Management – Pulumi Insights +layout: insights-governance + +heading: Insights & Governance +subheading: | + Complete visibility and control for your cloud + +meta_desc: Join us on November 5 to see how Neo helps you get clean and stay clean - automatically. Watch it in action. Live demo + Q&A. +meta_image: /images/product/insights-neo-launch-meta.png + +aliases: +- /insights +- /product/pulumi-insights +- /product/crossguard +- /crossguard + +preview: + header: Pulumi Neo just got smarter about infrastructure policy automation + description: "Join us on November 5 at 10:00 AM PT / 18:00 UTC for Pulumi Policies: Get Clean and Stay Clean Automatically. Watch the live demo and join the Q&A." + hubspotID: 4031229e-1370-4118-9379-ee2be1fd64fd + videoID: mwcrOTEf1EQ?si=Fx77RxM-uCjJLN-6 + +overview: + header: Complete visibility and control for your cloud + title: Continuous Compliance, By Construction + subtitle: See everything. Control everything. Ship with confidence. + body: | + Stop compliance violations before they become problems. Pulumi Insights & Governance provides a complete lifecycle for auditing existing infrastructure, fixing violations with AI-powered remediation, and preventing future infrastructure issues using policy-as-code guardrails. + + Pulumi Policies and Neo close the loop from detection to remediation, ensuring your infrastructure stays secure, compliant, and well-governed automatically. + + items: + - title: Policy as Code + icon: shield + icon_color: purple + description: | + Write policies in TypeScript or Python. Hundreds of built-in policies. Block bad configurations before they ship. Auto-remediate existing violations. + + - title: Cloud Resource Search + icon: eye + icon_color: yellow + description: | + Search across all your clouds using structured queries or natural language. Find resources, track dependencies, identify security risks and compliance violations. + + - title: Complete Cloud Visibility + icon: global + icon_color: blue + description: | + See every resource across AWS, Azure, GCP, and thousands of providers. Track relationships, monitor drift, identify unused resources. + + +features: + - header: Audit Existing Infrastructure Against Compliance Standards + body: | + Works with ANY infrastructure—Pulumi, Terraform, CloudFormation, or manual deployments. + + Continuous audit scans evaluate your entire infrastructure against industry frameworks without disrupting deployment pipelines. Non-blocking compliance checks provide instant visibility into your security posture across CIS Controls, NIST SP 800-53, HITRUST CSF, and PCI DSS standards. + items: + - Pre-built compliance frameworks ready to deploy + - Evaluate existing infrastructure on demand with audit mode + - Automatic triggers after deployments + - Auditor-friendly compliance reporting + graphic: /images/product/insights-findings.png + - header: Automatically Generate Fixes for Policy Violations + body: Pulumi Neo analyzes policy issues and automatically generates infrastructure-as-code remediation. For resources created outside your control (shadow IT, manual console changes), Neo discovers them, imports them into Pulumi, and fixes compliance violations in a single workflow, eliminating surprise audit findings and cost overruns. Transform hours of manual work into simple review-and-merge processes. + items: + - AI-generated infrastructure-as-code fixes + - Import and remediate unmanaged resources + - Integrated approval workflows + - Complete audit trails for compliance + - Governance-aware remediation with policy compliance checks + graphic: /images/product/insights-remediate.png + - header: Prevent Non-Compliant Deployments Before Production + body: Write governance policies in TypeScript or Python, languages your team already knows. Deploy pre-built compliance packs or create custom rules that enforce your organization's standards. Policies block problematic configurations during deployment, providing immediate feedback to developers within their existing workflows. + items: + - Policy-as-code in TypeScript/Python (no DSLs) + - Pre-built packs for CIS, NIST, HITRUST, PCI DSS + - Progressive enforcement (advisory → mandatory) + - Immediate feedback during deployment workflows + - Neo-generated infrastructure automatically complies with policy standards + graphic: /images/product/insights-blocking.png + - header: Search and Understand Your Entire Cloud Footprint + body: Query any resource across major clouds with natural language or advanced filters. Track configuration changes, analyze relationships between resources, and get answers about your infrastructure in seconds. Pulumi discovers all resources, including those created outside infrastructure-as-code, providing complete visibility for governance and troubleshooting. + items: + - Natural language search with AI + - Multi-cloud resource discovery + - Configuration change history + - Resource relationship mapping + graphic: /images/product/insights-search.png + - header: Give Developers AI-Powered Guardrails, Not Red Tape + body: Developers get immediate policy feedback during deployment, with AI-generated fixes when issues arise. Platform teams get measurable compliance improvements without becoming bottlenecks. Policy enforcement accelerates development velocity. + items: + - Shift-left security with pre-deployment validation + - Clear, actionable error messages + - Policy-aware AI remediation + - Measurable compliance improvements without velocity loss + graphic: /images/product/insights-advisory.png +compliance_frameworks: + title: Pre-Built Compliance Frameworks Ready to Deploy + description: Stop building compliance policies from scratch. Deploy expert-authored policy packs that map directly to industry standards and audit requirements. + items: + - /images/product/cis.png + - /images/product/nist.png + - /images/product/pci-dss.png + - /images/product/hitrust.png + - /images/product/aicpa.png + - /images/product/fedramp.png + - /images/product/iso-20071.png + +governance: + title: The Complete Governance Lifecycle + image: /images/product/insights-diagram.svg + items: + - header: "Step 1: Audit" + body: Continuous scans reveal compliance posture across existing infrastructure + - header: "Step 2: Remediate" + body: AI generates infrastructure-as-code fixes for policy violations + - header: "Step 3: Prevent" + body: Policy guardrails block non-compliant deployments automatically + +customer_quotes: + spear: + text: | + “We gave our auditors access to our policy packs because it's far easier to understand and prove controls in code than in docs and diagrams. With Pulumi's Policy as Code approach, that manual review process has gone away. We've reduced our Authority to Operate (ATO) timeline from a year and a half to expecting approval in three months.” + author: Michael Hunter, CEO, Spear AI + logo: spearAI + +analytics: + title: Analytics & Intelligence + subtitle: Data-driven infrastructure decisions + image: /images/product/pulumi-insights-analytics.png + description: | + Transform infrastructure data into actionable intelligence. Track costs, identify trends, detect anomalies, and measure compliance. Export to Snowflake, BigQuery, or any data warehouse. Build custom dashboards, automate reports, and integrate with your existing BI tools. Make informed decisions backed by comprehensive cloud analytics. + +pricing: + title: Pricing + description: | + Insights & Governance capabilities are included with Pulumi Cloud. Get visibility and control over all your cloud resources, whether managed by Pulumi or not. + + **Pulumi Neo's policy remediation capabilities and pre-built compliance frameworks.** CIS Controls, NIST SP 800-53, PCI DSS v4.0, and HITRUST CSF v11.5 compliance packs are available starting with Team tier. Continuous compliance monitoring and AI-powered fix generation are available in Team, Enterprise, and Business Critical editions. + +learn: + title: Take control of your cloud + items: + - title: Start with complete visibility + description: | + Get instant visibility into all your cloud resources. Add governance policies and optimize with AI-powered insights. + buttons: + - link: /docs/insights/get-started/ + type: primary + action: Get Started with Pulumi Insights + - link: /contact/?form=request-a-demo + type: secondary + action: Book a Demo + - title: Transform Governance from Bottleneck to Competitive Advantage + description: | + Start with audit scans to understand your compliance posture. Add AI-powered remediation to eliminate issue backlogs. Deploy preventive policies to maintain compliance automatically. + buttons: + - link: /docs/insights/policy/get-started/ + type: primary + action: Get Started with Pulumi Policies + - link: https://app.pulumi.com/signup + type: secondary + action: Try Pulumi Cloud for Free +--- diff --git a/content/product/pulumi-insights.md b/content/product/pulumi-insights.md deleted file mode 100644 index 6826c6fb4eaf..000000000000 --- a/content/product/pulumi-insights.md +++ /dev/null @@ -1,128 +0,0 @@ ---- -title: Cloud Asset and Compliance Management – Pulumi Insights -layout: pulumi-insights - -heading: Insights & Governance -subheading: | - Complete visibility and control for your cloud - -meta_desc: Join us on November 5 to see how Neo helps you get clean and stay clean - automatically. Watch it in action. Live demo + Q&A. -meta_image: /images/product/insights-neo-launch-meta.png - -aliases: -- /insights -- /product/pulumi-insights -- /product/crossguard -- /crossguard - -preview: - header: Pulumi Neo just got smarter about infrastructure policy automation - description: "Join us on November 5 at 10:00 AM PT / 18:00 UTC for Pulumi Policies: Get Clean and Stay Clean Automatically. Watch the live demo and join the Q&A." - hubspotID: 4031229e-1370-4118-9379-ee2be1fd64fd - videoID: mwcrOTEf1EQ?si=Fx77RxM-uCjJLN-6 - -overview: - header: Complete visibility and control for your cloud - title: See everything. Control everything. Ship with confidence. - body: | - Get complete visibility into your cloud infrastructure - whether created with Pulumi IaC, Terraform, CloudFormation, or the console. Enforce policies as code, ensure compliance, and catch issues before they reach production. - items: - - title: Policy as Code - icon: shield - icon_color: purple - description: | - Write policies in TypeScript or Python. Hundreds of built-in policies. Block bad configurations before they ship. Auto-remediate existing violations. - - - title: Cloud Resource Search - icon: eye - icon_color: yellow - description: | - Search across all your clouds using structured queries or natural language. Find resources, track dependencies, identify security risks and compliance violations. - - - title: Complete Cloud Visibility - icon: global - icon_color: blue - description: | - See every resource across AWS, Azure, GCP, and thousands of providers. Track relationships, monitor drift, identify unused resources. - -workflow: - description: | - From discovery to governance, get the visibility and control you need to manage cloud infrastructure at scale. - items: - - header: Discover - body: Automatically scan and catalog all cloud resources across AWS, Azure, GCP, and thousands of providers - regardless of how they were created. - - header: Govern - body: Enforce policies as code across your entire infrastructure. Prevent violations at deployment time, ensure compliance, maintain security standards. - - header: Analyze - body: Search and query your infrastructure. Understand relationships, track dependencies, identify security and compliance issues. - - header: Act - body: Fix policy violations, remediate security issues, clean up unused resources. Take action based on real data, not guesswork. - -features: - - header: Resource Search - subheader: Find anything in any cloud - body: Search your infrastructure across thousands of cloud providers using structured queries or natural language. Find specific resources across multiple clouds and environments. Track down untagged resources, identify security group violations, or locate idle infrastructure across your entire organization. - graphic: /images/product/insights-resource-search.png - - header: Policy as Code - subheader: Enterprise governance using real programming languages - body: Write policies in TypeScript or Python - the same languages you use for infrastructure. Choose from hundreds of built-in policies or create custom rules. Block non-compliant resources during `pulumi up`. Auto-remediate existing violations. Meet SOC 2, HIPAA, and PCI-DSS requirements. - graphic: /images/product/insights-policy.png - - header: Natural Language Search - subheader: Ask questions about your infrastructure - body: Search using plain English queries. "Which EC2 instances are publicly accessible?" "What changed in production last week?" "Show me resources without required tags." Get answers across all your clouds instantly. - graphic: /images/product/insights-copilot.png - - header: Cloud Discovery - subheader: See everything, regardless of how it was created - body: Automatically discover and catalog resources created outside of Pulumi - whether from Terraform, CloudFormation, or manual console operations. Get complete visibility across your entire cloud estate. Apply policies and insights to all resources, not just Pulumi-managed ones. - graphic: /images/product/insights-scan-sync.png - -governance: - title: Enterprise-Grade Governance - subtitle: Policy enforcement that doesn't slow you down - image: https://www.pulumi.com/uploads/pulumi-insights-copilot.gif - description: | - Shift security and compliance left with policy as code. Define guardrails in TypeScript or Python, enforce them at deployment time, and automatically remediate violations. Integrate with your existing compliance frameworks and get detailed audit trails for every policy decision. - -customer_quotes: - alkira: - text: | - “I’m making developers at Alkira significantly more productive while also making my job easier using Pulumi’s IaC platform and features like Pulumi Insights and Deployments. I can get developers using IaC immediately with Pulumi Deployments and its GitHub integration, while Pulumi Insights makes it really easy to find idle developer environments that need to be shut down, which reduces our cloud costs.” - author: Santosh Dornal, Head of Software Test & DevOps - logo: alkira - -analytics: - title: Analytics & Intelligence - subtitle: Data-driven infrastructure decisions - image: /images/product/pulumi-insights-analytics.png - description: | - Transform infrastructure data into actionable intelligence. Track costs, identify trends, detect anomalies, and measure compliance. Export to Snowflake, BigQuery, or any data warehouse. Build custom dashboards, automate reports, and integrate with your existing BI tools. Make informed decisions backed by comprehensive cloud analytics. - -pricing: - title: Pricing - description: | - Insights & Governance capabilities are included with Pulumi Cloud. Get visibility and control over all your cloud resources, whether managed by Pulumi or not. - -learn: - title: Take control of your cloud - items: - - title: Start with complete visibility - description: | - Get instant visibility into all your cloud resources. Add governance policies and optimize with AI-powered insights. - buttons: - - link: /docs/insights/get-started/ - type: primary - action: Start Free - - link: /contact/?form=request-a-demo - type: secondary - action: Book a Demo - - title: Learn more - description: | - Discover how to implement policies, track compliance, and optimize costs across your entire cloud infrastructure. - buttons: - - link: /docs/pulumi-cloud/insights/ - type: primary - action: Read the Docs - - link: /docs/insights/policy/policy-as-code/ - type: secondary - action: Policy Guide ---- diff --git a/layouts/index.html b/layouts/index.html index 1b276ddeab94..1608e7afef31 100644 --- a/layouts/index.html +++ b/layouts/index.html @@ -199,7 +199,7 @@

{{ .Params.insights.title }}

{{ .Params.insights.description | markdownify }}

Learn more: - Pulumi InsightsPulumi Insights
diff --git a/layouts/page/why-pulumi.html b/layouts/page/why-pulumi.html index cf2a660bf535..892cc54dc77e 100644 --- a/layouts/page/why-pulumi.html +++ b/layouts/page/why-pulumi.html @@ -174,7 +174,7 @@
Enforce Standards
- Learn About Policy As Code + Learn About Policy As Code Get Started
diff --git a/layouts/partials/customer-logos/spearAI.html b/layouts/partials/customer-logos/spearAI.html new file mode 100644 index 000000000000..f566dc63a064 --- /dev/null +++ b/layouts/partials/customer-logos/spearAI.html @@ -0,0 +1 @@ +Spear AI \ No newline at end of file diff --git a/layouts/partials/header.html b/layouts/partials/header.html index 07d168d61fe5..5cb3a1ebff9d 100644 --- a/layouts/partials/header.html +++ b/layouts/partials/header.html @@ -1,516 +1,539 @@ {{ if or (hasPrefix .RelPermalink "/docs/") (hasPrefix .RelPermalink "/tutorials/") }} - {{ partial "docs-top-nav" . }} -
- - {{ .Scratch.Set "mode" .Section }} -
+{{ partial "docs-top-nav" . }} +
+ + {{ .Scratch.Set "mode" .Section }} +
{{ else }} - - -{{ end }} + + + + +{{ end }} \ No newline at end of file diff --git a/layouts/product/pulumi-insights.html b/layouts/product/insights-governance.html similarity index 51% rename from layouts/product/pulumi-insights.html rename to layouts/product/insights-governance.html index 030ec9c2096a..e862f502dc5b 100644 --- a/layouts/product/pulumi-insights.html +++ b/layouts/product/insights-governance.html @@ -1,87 +1,37 @@ +{{ define "hero" }} +{{ partial "hero" (dict "title" "Insights & Governance") }} +{{ end }} + {{ define "main" }} {{ $pageContext := . }} -
-
-
-
{{ .Params.preview.header | markdownify }}
-

{{ .Params.preview.description | markdownify }}

- -
-
-
- -
-
-
-
- +
+ +

{{ .Params.overview.title }}

+
{{ .Params.overview.subtitle | markdownify }}

{{ .Params.overview.body | markdownify }}

-
-
-
- {{ range $item := .Params.overview.items }} -
-
-
- {{ partial "color-icon.html" (dict "icon" $item.icon "icon_color" $item.icon_color) }} -
-
-
{{ $item.title }}
-
-
-

{{ $item.description | markdownify }}

-
+ title="{{ .Params.preview.title }}">
- {{ end }}
-
-
-

Workflow

-
{{ .Params.workflow.description }}
-
-
- {{ range $feature := .Params.workflow.items }} -
-
-
{{ $feature.header }}
-

{{ $feature.body }}

-
-
- {{ end }} -
-
-
-
-