Skip to content

Commit 46262ce

Browse files
Merge pull request #78324 from fmcdonal/OSDOCS-10209-2
OSDOCS-10209: ROSA Approved Access
2 parents 084378b + 717a65c commit 46262ce

File tree

3 files changed

+7
-10
lines changed

3 files changed

+7
-10
lines changed

_topic_maps/_topic_map_rosa.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -313,9 +313,8 @@ Topics:
313313
File: index
314314
- Name: Managing your cluster resources
315315
File: managing-cluster-resources
316-
# Removing until OSDOCS-10209 is GA
317-
#- Name: Approved Access
318-
# File: approved-access
316+
- Name: Approved Access
317+
File: approved-access
319318
- Name: Getting support
320319
File: getting-support
321320
Distros: openshift-rosa

rosa_release_notes/rosa-release-notes.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,9 @@ toc::[]
1818

1919
* **ROSA CLI update.** The ROSA CLI (`rosa`) was updated to a new version. For information about what has changed in this release, see the link:https://github.com/openshift/rosa/releases/tag/v1.2.41[ROSA CLI release notes]. For more information about the ROSA CLI (`rosa`), see xref:../cli_reference/rosa_cli/rosa-get-started-cli.adoc#rosa-about_rosa-getting-started-cli[About the ROSA CLI].
2020

21-
// Removed until OSDOCS-10209 is GA - please note that xref is broken and in backticks because prow doesn't understand what comments are
22-
// * **Approved Access for ROSA clusters.** Red{nbsp}Hat Site Reliability Engineering (SRE) managing and proactively supporting ROSA Clusters will typically not require access to customer Data as part of the normal operations. In the unlikely event should Red{nbsp}Hat SRE (Site Reliability Engineer) need access to customer data, the _Approved Access_ functionality provides an interface for customers to review and _approve_ or _deny_ access requests.
23-
// +
24-
// Access requests to customer data on ROSA clusters and the corresponding cloud accounts can be created by Red{nbsp}Hat SRE either in response to a customer-initiated support ticket or in response to alerts received by a Red{nbsp}Hat SRE, as part of the standard incident response process. For more information, see `xref:` `../support/approved-access.adoc#approved-access[Approved Access]`. This is applicable to ROSA and Red{nbsp}Hat OpenShift Service on AWS (classic architecture).
21+
* **Approved Access for ROSA clusters.** Red{nbsp}Hat Site Reliability Engineering (SRE) managing and proactively supporting ROSA Clusters will typically not require elevated access to customer clusters as part of the normal operations. In the unlikely event should Red{nbsp}Hat SRE (Site Reliability Engineer) need elevated access, the _Approved Access_ functionality provides an interface for customers to review and _approve_ or _deny_ access requests.
22+
+
23+
Elevated access requests to ROSA clusters and the corresponding cloud accounts can be created by Red{nbsp}Hat SRE either in response to a customer-initiated support ticket or in response to alerts received by a Red{nbsp}Hat SRE, as part of the standard incident response process. For more information, see xref:../support/approved-access.adoc#approved-access[Approved Access]. This is applicable to ROSA and Red{nbsp}Hat OpenShift Service on AWS (classic architecture).
2524

2625
* **ROSA command enhancement.** The `rosa describe` command has a new optional argument, `--get-role-policy-bindings`. This new argument allows users to view the policies attached to STS roles assigned to the selected cluster. For more information, see xref:../cli_reference/rosa_cli/rosa-manage-objects-cli.adoc#rosa-describe-cluster_rosa-managing-objects-cli[describe cluster].
2726

support/approved-access.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ endif::[]
99

1010
toc::[]
1111

12-
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require access to systems containing customer data as part of normal operations to manage and support {product-title} clusters. In the unlikely event that SRE needs access to systems containing customer data, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
12+
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require a elevated access to systems as part of normal operations to manage and support {product-title} clusters. In the unlikely event that SRE needs elevated access to systems, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
1313

14-
Access requests to customer data on {product-rosa} clusters and the corresponding cloud accounts can be created by SRE either in response to a customer-initiated support ticket or in response to alerts received by SRE as part of the standard incident response process.
14+
Elevated access requests to clusters on {product-rosa} clusters and the corresponding cloud accounts can be created by SRE either in response to a customer-initiated support ticket or in response to alerts received by SRE as part of the standard incident response process.
1515

1616
When _Approved Access_ is enabled and an SRE creates an access request, _cluster owners_ receive an email notification informing them of a new access request. The email notification contains a link allowing the cluster owner to quickly approve or deny the access request. You must respond in a timely manner otherwise there is a risk to your SLA for {product-rosa}.
1717

@@ -22,7 +22,6 @@ When _Approved Access_ is enabled and an SRE creates an access request, _cluster
2222
====
2323
Denying an access request requires you to complete the *Justification* field. In this case, SRE can not directly act on the resources related to the incident. Customers can still use the link:https://access.redhat.com/support/cases/#/case/list[*Customer Support*] to help investigate and resolve any issues.
2424
====
25-
// Approved access
2625

2726
include::modules/support-submitting-a-case-enable-approved-access.adoc[leveloffset=+1]
2827
include::modules/support-reviewing-an-access-request-from-an-email-notification.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)