Skip to content

Commit 4cbf8d0

Browse files
committed
adds emphasis
1 parent 2d2a22b commit 4cbf8d0

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

docs/cloud-native-security/kspm-get-started.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
128128

129129
Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions.
130130

131-
During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
131+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
132132

133133
[discrete]
134134
[[kspm-use-instance-role]]
135135
==== Option 2 - Use default instance role
136136
Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile.
137137

138-
During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
138+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
139139

140140
[discrete]
141141
[[kspm-use-keys-directly]]

docs/serverless/cloud-native-security/get-started-with-kspm.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,14 +130,18 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
130130

131131
Follow AWS's [EKS Best Practices](https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa) documentation to use the [IAM Role to Kubernetes Service-Account](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) (IRSA) feature to get temporary credentials and scoped permissions.
132132

133+
<DocCallOut title="Important" color="warning">
133134
During setup, do not fill in any option in the "Setup Access" section. Instead click **Save and continue**.
135+
</DocCallOut>
134136

135137
<div id="kspm-use-instance-role"></div>
136138

137139
#### Option 2 - Use default instance role
138140
Follow AWS's [IAM roles for Amazon EC2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html) documentation to create an IAM role using the IAM console, which automatically generates an instance profile.
139141

142+
<DocCallOut title="Important" color="warning">
140143
During setup, do not fill in any option in the "Setup Access" section. Click **Save and continue**.
144+
</DocCallOut>
141145

142146
<div id="kspm-use-keys-directly"></div>
143147

0 commit comments

Comments
 (0)