File tree Expand file tree Collapse file tree 3 files changed +5
-4
lines changed
rosa_architecture/rosa_policy_service_definition Expand file tree Collapse file tree 3 files changed +5
-4
lines changed Original file line number Diff line number Diff line change @@ -50,8 +50,8 @@ Topics:
50
50
File : policy-responsibility-matrix
51
51
- Name : Understanding process and security for OpenShift Dedicated
52
52
File : policy-process-security
53
- # - Name: SRE and service account access
54
- # File: osd-sre-access
53
+ - Name : SRE and service account access
54
+ File : osd-sre-access
55
55
- Name : About availability for OpenShift Dedicated
56
56
File : policy-understand-availability
57
57
- Name : Update life cycle
Original file line number Diff line number Diff line change @@ -67,8 +67,8 @@ Topics:
67
67
File : rosa-life-cycle
68
68
- Name : Understanding security for ROSA
69
69
File : rosa-policy-process-security
70
- # - Name: SRE and service account access
71
- # File: rosa-sre-access
70
+ - Name : SRE and service account access
71
+ File : rosa-sre-access
72
72
- Name : About IAM resources for ROSA with STS
73
73
File : rosa-sts-about-iam-resources
74
74
- Name : OpenID Connect Overview
Original file line number Diff line number Diff line change @@ -7,6 +7,7 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
7
7
Red Hat site reliability engineering (SRE) access to ROSA clusters is outlined through identity and access management.
8
8
9
9
include::modules/rosa-policy-identity-access-management.adoc[leveloffset=+1]
10
+ include::modules/sre-cluster-access.adoc[leveloffset=+1]
10
11
include::modules/rosa-sre-access-privatelink-vpc.adoc[leveloffset=+1]
11
12
include::modules/how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects.adoc[leveloffset=+1]
12
13
You can’t perform that action at this time.
0 commit comments