You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
changed from link to xref and added xref to addtional resources in adoc
had 2 endif statements, removed one from additional resources sre-access doc
removed xref from module
fixed additonal resouces line
fixed additonal resources in other file too
fixed cluster roles link to an xref in additional resources
fixed cluster roles link in additional resources
added additional resources for hcp also
added additional resources for hcp and rosa
reverted conditionals for additional resources for hcp and rosa
reverted to links instead of exref
removed ifndef for hcp viewing and added links for xrefs for other additional resources
Copy file name to clipboardExpand all lines: modules/rosa-red-hat-support-access.adoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Write: None
29
29
30
30
Write: None
31
31
32
-
|OpenShift SRE - Elevated Access ^[2]^ (Gated by link:https://docs.openshift.com/rosa/support/approved-access.html[Approved Access])| Read: All
32
+
|OpenShift SRE - Elevated Access ^[2]^ (Gated by link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access])| Read: All
33
33
34
34
Write: All
35
35
@@ -111,6 +111,6 @@ Write: None
111
111
|===
112
112
--
113
113
1. Limited to addressing common use cases such as failing deployments, upgrading a cluster, and replacing bad worker nodes.
114
-
2. Elevated access gives SRE the access levels of a cluster-admin role. See link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#default-roles_using-rbac[cluster roles] for more information.
114
+
2. Elevated access gives SRE the access levels of a cluster-admin role and is gated by Approved Access. For more information, see "Default cluster roles" and "Approved Access".
115
115
3. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].
22
+
23
+
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/authentication_and_authorization/using-rbac#default-roles_using-rbac[Default cluster roles]
* For more information about the AWS IAM roles used by the cluster Operators, see xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
32
+
* For more information about the AWS IAM roles used by the cluster Operators, see https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
33
+
34
+
* For more information about the policies and permissions that the cluster Operators require, see https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-account-wide-roles-and-policies-creation-methods_rosa-sts-about-iam-resources[Methods of account-wide role creation].
28
35
29
-
* For more information about the policies and permissions that the cluster Operators require, see xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies-creation-methods_rosa-sts-about-iam-resources[Methods of account-wide role creation].
30
-
endif::openshift-rosa-hcp[]
36
+
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].
0 commit comments