You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/rosa-roles-and-policies.adoc
+11-9Lines changed: 11 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -6,10 +6,10 @@
6
6
[id="rosa-roles-and-policies_{context}"]
7
7
= AWS managed policies and roles
8
8
9
-
[id="aws-managed-policies"]
9
+
ifdef::openshift-rosa-hcp[]
10
+
[id="aws-managed-policies-hcp"]
10
11
== AWS managed policies
11
12
12
-
ifdef::openshift-rosa-hcp[]
13
13
.AWS managed account policies
14
14
[options="header",cols="2*"]
15
15
|===
@@ -34,12 +34,6 @@ ifdef::openshift-rosa-hcp[]
34
34
You must attach Operator policies to an Operator IAM role to allow a ROSA cluster to make calls to other AWS services.
35
35
====
36
36
37
-
[id="account-wide-roles"]
38
-
== Account-wide roles
39
-
* `<prefix>-HCP-ROSA-Worker-Role`
40
-
* `<prefix>-HCP-ROSA-Support-Role`
41
-
* `<prefix>-HCP-ROSA-Installer-Role`
42
-
43
37
.AWS managed Operator policies
44
38
[options="header",cols="2*"]
45
39
|===
@@ -72,7 +66,13 @@ You must attach Operator policies to an Operator IAM role to allow a ROSA cluste
72
66
73
67
|===
74
68
75
-
[id="operator-roles"]
69
+
[id="account-wide-roles-hcp"]
70
+
== Account-wide roles
71
+
* `<prefix>-HCP-ROSA-Worker-Role`
72
+
* `<prefix>-HCP-ROSA-Support-Role`
73
+
* `<prefix>-HCP-ROSA-Installer-Role`
74
+
75
+
[id="operator-roles-hcp"]
76
76
== Operator roles
77
77
78
78
Certain policies are used by the cluster Operator roles, listed below. The Operator roles are created in a second step because they are dependent on an existing cluster name and cannot be created at the same time as the account-wide roles.
@@ -94,6 +94,8 @@ For the full `JSON` information for the AWS managed policies, see the link:https
0 commit comments