Skip to content

Commit a95a4cd

Browse files
authored
Merge pull request #67797 from mletalie/OSDOCS-8203
[OSDOCS-8203]:Remove 4.11 warning
2 parents 0ebfa2c + 3a869a5 commit a95a4cd

File tree

2 files changed

+0
-4
lines changed

2 files changed

+0
-4
lines changed

modules/rosa-sts-account-wide-roles-and-policies.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,6 @@
55
[id="rosa-sts-account-wide-roles-and-policies_{context}"]
66
= Account-wide IAM role and policy reference
77

8-
include::snippets/rosa-4-11-12-snippet.adoc[]
9-
108
This section provides details about the account-wide IAM roles and policies that are required for ROSA deployments that use STS, including the Operator policies. It also includes the JSON files that define the policies.
119

1210
The account-wide roles and policies are specific to an OpenShift minor release version, for example OpenShift 4.8, and are backward compatible. You can minimize the required STS resources by reusing the account-wide roles and policies for multiple clusters of the same minor version, regardless of their patch version.

rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-with-customizations.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
66

77
toc::[]
88

9-
include::snippets/rosa-4-11-12-snippet.adoc[]
10-
119
Create a {product-title} (ROSA) cluster with the AWS Security Token Service (STS) using customizations. You can deploy your cluster by using {cluster-manager-first} or the ROSA CLI (`rosa`).
1210

1311
With the procedures in this document, you can also choose between the `auto` and `manual` modes when creating the required AWS Identity and Access Management (IAM) resources.

0 commit comments

Comments
 (0)