Skip to content

Commit c71bb4c

Browse files
committed
OSDOCS-10209 Removing non-GA doc on approved access
1 parent 6300014 commit c71bb4c

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

_topic_maps/_topic_map_rosa.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -315,8 +315,9 @@ Topics:
315315
File: index
316316
- Name: Managing your cluster resources
317317
File: managing-cluster-resources
318-
- Name: Approved Access
319-
File: approved-access
318+
# Removing until OSDOCS-10209 is GA
319+
#- Name: Approved Access
320+
# File: approved-access
320321
- Name: Getting support
321322
File: getting-support
322323
Distros: openshift-rosa

rosa_release_notes/rosa-release-notes.adoc

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,10 @@ toc::[]
1818

1919
* **ROSA CLI update.** The ROSA CLI (`rosa`) was updated to a new version. For information about what has changed in this release, see the link:https://github.com/openshift/rosa/releases/tag/v1.2.41[ROSA CLI release notes]. For more information about the ROSA CLI (`rosa`), see xref:../cli_reference/rosa_cli/rosa-get-started-cli.adoc#rosa-about_rosa-getting-started-cli[About the ROSA CLI].
2020

21-
* **Approved Access for ROSA clusters.** Red{nbsp}Hat Site Reliability Engineering (SRE) managing and proactively supporting ROSA Clusters will typically not require access to customer Data as part of the normal operations. In the unlikely event should Red{nbsp}Hat SRE (Site Reliability Engineer) need access to customer data, the _Approved Access_ functionality provides an interface for customers to review and _approve_ or _deny_ access requests.
22-
+
23-
Access requests to customer data on ROSA clusters and the corresponding cloud accounts can be created by Red{nbsp}Hat SRE either in response to a customer-initiated support ticket or in response to alerts received by a Red{nbsp}Hat SRE, as part of the standard incident response process. For more information, see xref:../support/approved-access.adoc#approved-access[Approved Access]. This is applicable to ROSA and Red{nbsp}Hat OpenShift Service on AWS (classic architecture).
21+
// Removed until OSDOCS-10209 is GA - please note that xref is broken and in backticks because prow doesn't understand what comments are
22+
// * **Approved Access for ROSA clusters.** Red{nbsp}Hat Site Reliability Engineering (SRE) managing and proactively supporting ROSA Clusters will typically not require access to customer Data as part of the normal operations. In the unlikely event should Red{nbsp}Hat SRE (Site Reliability Engineer) need access to customer data, the _Approved Access_ functionality provides an interface for customers to review and _approve_ or _deny_ access requests.
23+
// +
24+
// Access requests to customer data on ROSA clusters and the corresponding cloud accounts can be created by Red{nbsp}Hat SRE either in response to a customer-initiated support ticket or in response to alerts received by a Red{nbsp}Hat SRE, as part of the standard incident response process. For more information, see `xref:` `../support/approved-access.adoc#approved-access[Approved Access]`. This is applicable to ROSA and Red{nbsp}Hat OpenShift Service on AWS (classic architecture).
2425

2526
* **ROSA command enhancement.** The `rosa describe` command has a new optional argument, `--get-role-policy-bindings`. This new argument allows users to view the policies attached to STS roles assigned to the selected cluster. For more information, see xref:../cli_reference/rosa_cli/rosa-manage-objects-cli.adoc#rosa-describe-cluster_rosa-managing-objects-cli[describe cluster].
2627

0 commit comments

Comments
 (0)