Skip to content

Commit 1a32e42

Browse files
committed
edit
1 parent 5b5b9b5 commit 1a32e42

File tree

2 files changed

+32
-12
lines changed

2 files changed

+32
-12
lines changed

modules/rosa-roles-and-policies.adoc

Lines changed: 31 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -77,17 +77,12 @@ You must attach Operator policies to an Operator IAM role to allow a ROSA cluste
7777

7878
Certain policies are used by the cluster Operator roles, listed below. The Operator roles are created in a second step because they are dependent on an existing cluster name and cannot be created at the same time as the account-wide roles.
7979

80-
* <operator_role_prefix>-openshift-cluster-csi-drivers-ebs-cloud-credentials
81-
* <operator_role_prefix>-openshift-cloud-network-config-controller-cloud-credentials
82-
* <operator_role_prefix>-openshift-machine-api-aws-cloud-credentials
83-
* <operator_role_prefix>-openshift-cloud-credential-operator-cloud-credentials
84-
* <operator_role_prefix>-openshift-image-registry-installer-cloud-credentials
85-
* <operator_role_prefix>-openshift-ingress-operator-cloud-credentials
86-
87-
[NOTE]
88-
====
89-
Trust policies are created for each account-wide role and each Operator role.
90-
====
80+
* `<operator_role_prefix>-openshift-cluster-csi-drivers-ebs-cloud-credentials`
81+
* `<operator_role_prefix>-openshift-cloud-network-config-controller-cloud-credentials`
82+
* `<operator_role_prefix>-openshift-machine-api-aws-cloud-credentials`
83+
* `<operator_role_prefix>-openshift-cloud-credential-operator-cloud-credentials`
84+
* `<operator_role_prefix>-openshift-image-registry-installer-cloud-credentials`
85+
* `<operator_role_prefix>-openshift-ingress-operator-cloud-credentials`
9186

9287
For the full `JSON` information for the AWS managed policies, see the link:https://docs.aws.amazon.com/aws-managed-policy/latest/reference/about-managed-policy-reference.html[AWS Managed Policy Reference guide].
9388

@@ -144,5 +139,30 @@ ifdef::openshift-rosa[]
144139
|===
145140

146141
For the full `JSON` information for the following policies, see the link:https://docs.aws.amazon.com/rosa/latest/userguide/security-iam-rosa-classic-account-policies.html#security-iam-id-based-policy-examples-rosa-classic-support-policy[AWS _ROSA classic account policies_ documentation].
142+
143+
[id="account-wide-roles"]
144+
== Account-wide roles
145+
146+
* `ManagedOpenShift-Installer-Role`
147+
* `ManagedOpenShift-ControlPlane-Role`
148+
* `ManagedOpenShift-Worker-Role`
149+
* `ManagedOpenShift-Support-Role`
150+
151+
152+
[id="operator-roles"]
153+
== Operator roles
154+
155+
Certain policies are used by the cluster Operator roles, listed below. The Operator roles are created in a second step because they are dependent on an existing cluster name and cannot be created at the same time as the account-wide roles.
156+
157+
* `<cluster-name\>-xxxx-openshift-cluster-csi-drivers-ebs-cloud-credent`
158+
* `<cluster-name\>-xxxx-openshift-cloud-network-config-controller-cloud`
159+
* `<cluster-name\>-xxxx-openshift-machine-api-aws-cloud-credentials`
160+
* `<cluster-name\>-xxxx-openshift-cloud-credential-operator-cloud-crede`
161+
* `<cluster-name\>-xxxx-openshift-image-registry-installer-cloud-creden`
162+
* `<cluster-name\>-xxxx-openshift-ingress-operator-cloud-credentials`
147163
endif::openshift-rosa[]
148164

165+
[NOTE]
166+
====
167+
Trust policies are created for each account-wide role and each Operator role.
168+
====

welcome/cloud-experts-rosa-hcp-sts-explained.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ endif::openshift-rosa-hcp[]
6161
+
6262
[NOTE]
6363
====
64-
See xref://authentication/rosa-aws-managed-policy-reference.adoc#rosa-roles-and-policies_rosa-aws-managed-policy-reference[AWS managed policies and roles] for a comprehensive view of the AWS managed policies.
64+
See xref:../authentication/rosa-aws-managed-policy-reference.adoc#rosa-roles-and-policies_rosa-aws-managed-policy-reference[AWS managed policies and roles] for a comprehensive view of the AWS managed policies.
6565
====
6666
+
6767
*** link:https://docs.aws.amazon.com/aws-managed-policy/latest/reference/ROSAInstallerPolicy.html[ROSAInstallerPolicy]

0 commit comments

Comments
 (0)