Skip to content

Commit 075459c

Browse files
committed
Relabeled a list to fix build errors.
1 parent d71d52c commit 075459c

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

rosa_planning/rosa-sts-ocm-role.adoc

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ This trust relationship is achieved through the creation and association of the
1212

1313
The AWS IAM roles required to use {cluster-manager} are:
1414

15-
1. `ocm-role`
16-
2. `user-role`
15+
* `ocm-role`
16+
* `user-role`
1717
1818
Whether you manage your clusters using the `rosa` CLI or {cluster-manager} web UI, you must create the account-wide roles, known as `account-roles` in the `rosa` CLI, by using the `rosa` CLI. These account roles are necessary for your first cluster, and these roles can be used across multiple clusters. These required account roles are:
1919

20-
1. `Worker-Role`
21-
1. `Support-Role`
22-
1. `Installer-Role`
23-
1. `ControlPlane-Role`
20+
* `Worker-Role`
21+
* `Support-Role`
22+
* `Installer-Role`
23+
* `ControlPlane-Role`
2424
2525
[NOTE]
2626
====
@@ -31,12 +31,12 @@ For more information about creating these roles, see xref:../rosa_architecture/r
3131

3232
Cluster-specific Operator roles, known as `operator-roles` in the `rosa` CLI, obtain the temporary permissions required to carry out cluster operations, such as managing back-end storage, ingress, and registry. These roles are required by the cluster that you create. These required Operator roles are:
3333

34-
1. `<cluster_name>-<hash>-openshift-cluster-csi-drivers-ebs-cloud-credentials`
35-
1. `<cluster_name>-<hash>-openshift-cloud-network-config-controller-credentials`
36-
1. `<cluster_name>-<hash>-openshift-machine-api-aws-cloud-credentials`
37-
1. `<cluster_name>-<hash>-openshift-cloud-credential-operator-cloud-credentials`
38-
1. `<cluster_name>-<hash>-openshift-image-registry-installer-cloud-credentials`
39-
1. `<cluster_name>-<hash>-openshift-ingress-operator-cloud-credentials`
34+
* `<cluster_name>-<hash>-openshift-cluster-csi-drivers-ebs-cloud-credentials`
35+
* `<cluster_name>-<hash>-openshift-cloud-network-config-controller-credentials`
36+
* `<cluster_name>-<hash>-openshift-machine-api-aws-cloud-credentials`
37+
* `<cluster_name>-<hash>-openshift-cloud-credential-operator-cloud-credentials`
38+
* `<cluster_name>-<hash>-openshift-image-registry-installer-cloud-credentials`
39+
* `<cluster_name>-<hash>-openshift-ingress-operator-cloud-credentials`
4040
4141
For more information on creating these roles, see xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
4242

0 commit comments

Comments
 (0)