Skip to content

Commit 35c06fa

Browse files
authored
Merge pull request #86238 from fmcdonal/OSDOCS-12393
OSDOCS-12393: Approved Access updates for SRE access information
2 parents 1cf65d0 + 0f7f06f commit 35c06fa

File tree

2 files changed

+27
-12
lines changed

2 files changed

+27
-12
lines changed

modules/rosa-red-hat-support-access.adoc

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,34 @@ Members of the Red{nbsp}Hat Customer Experience and Engagement (CEE) team typica
1414

1515
| Role | Core namespace | Layered product namespace | Customer namespace | AWS account^*^
1616

17-
|OpenShift SRE| Read: All
17+
|OpenShift SRE - Normal operations ^[1]^| Read: All
1818

1919
Write: Very
2020

21-
limited ^[1]^
21+
limited
2222
| Read: All
2323

2424
Write: None
25-
| Read: None^[2]^
25+
| Read: None
2626

2727
Write: None
28-
|Read: All ^[3]^
28+
|Read: None
29+
30+
Write: None
31+
32+
|OpenShift SRE - Elevated Access ^[2]^ (Gated by link:https://docs.openshift.com/rosa/support/approved-access.html[Approved Access])| Read: All
33+
34+
Write: All
35+
36+
| Read: All
2937

30-
Write: All ^[3]^
38+
Write: All
39+
| Read: All
40+
41+
Write: All
42+
|Read: All
43+
44+
Write: All
3145

3246
|CEE
3347
|Read: All
@@ -38,7 +52,7 @@ Write: None
3852

3953
Write: None
4054

41-
|Read: None^[2]^
55+
|Read: None
4256

4357
Write: None
4458

@@ -72,9 +86,9 @@ Write: None
7286

7387
Write: None
7488

75-
|Read: Limited^[4]^
89+
|Read: Limited ^[3]^
7690

77-
Write: Limited^[4]^
91+
Write: Limited ^[3]^
7892

7993
|Read: None
8094

@@ -97,7 +111,6 @@ Write: None
97111
|===
98112
--
99113
1. Limited to addressing common use cases such as failing deployments, upgrading a cluster, and replacing bad worker nodes.
100-
2. Red{nbsp}Hat associates have no access to customer data by default.
101-
3. SRE access to the AWS account is an emergency procedure for exceptional troubleshooting during a documented incident.
102-
4. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
114+
2. Elevated access gives SRE the access levels of a cluster-admin role. See link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#default-roles_using-rbac[cluster roles] for more information.
115+
3. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
103116
--

support/approved-access.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ endif::[]
99

1010
toc::[]
1111

12-
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require an elevated access to systems as part of normal operations to manage and support {product-title} clusters. In the unlikely event that SRE needs elevated access to systems, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
12+
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require elevated access to systems as part of normal operations to manage and support {product-title} clusters. Elevated access gives SRE the access levels of a cluster-admin role. See link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#default-roles_using-rbac[cluster roles] for more information.
13+
14+
In the unlikely event that SRE needs elevated access to systems, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
1315

1416
Elevated access requests to clusters on {product-rosa} clusters and the corresponding cloud accounts can be created by SRE either in response to a customer-initiated support ticket or in response to alerts received by SRE as part of the standard incident response process.
1517

0 commit comments

Comments
 (0)