Open alexiswl opened 1 month ago
We make use of the icav2 data copy manager stack (to copy over the log files), and the terraform cdk setup for the ICAv2 access token.
We make use of the icav2 data copy manager stack (to copy over the log files), and the terraform cdk setup for the ICAv2 access token.