Skip to content

Commit d85bb08

Browse files
authored
Merge pull request #83507 from AedinC/OSDOCS-12336
OSDOCS-12336:Corrected formatting errors in create cluster using customizations CLI guide
2 parents 80f99e5 + 1a59eb7 commit d85bb08

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@ $ rosa create account-roles --interactive \ <1>
5151
----
5252
<1> `interactive` mode enables you to specify configuration options at the interactive prompts. For more information, see _Interactive cluster creation mode reference_.
5353
<2> `manual` mode generates the `aws` CLI commands and JSON files needed to create the account-wide roles and policies. After review, you must run the commands manually to create the resources.
54-
--
5554
+
55+
--
5656
.Example output
5757
[source,terminal,subs="attributes+"]
5858
----
@@ -94,12 +94,12 @@ You must specify an account-wide role prefix that is unique across your AWS acco
9494
+
9595
[NOTE]
9696
====
97-
In this step, the ROSA CLI also automatically creates the account-wide Operator IAM policies that are used by the cluster-specific Operator policies to permit the ROSA cluster Operators to carry out core OpenShift functionality. For more information, see _Account-wide IAM role and policy reference_.
97+
In this step, the ROSA CLI also automatically creates the account-wide Operator IAM policies that are used by the cluster-specific Operator policies to permit the ROSA cluster Operators to run core OpenShift functionality. For more information, see _Account-wide IAM role and policy reference_.
9898
====
99-
--
10099
+
101100
.. After review, run the `aws` commands manually to create the roles and policies. Alternatively, you can run the preceding command using `--mode auto` to run the `aws` commands immediately.
102-
101+
+
102+
--
103103
. Optional: If you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and persistent volumes (PVs), add the ARN for the account-wide installer role to your KMS key policy.
104104
+
105105
[IMPORTANT]

0 commit comments

Comments
 (0)