Skip to content

Commit dc6d358

Browse files
authored
Merge pull request #64510 from bmcelvee/OSDOCS-3562-final
OSDOCS-3562: SRE and service account access for ROSA and OSD
2 parents 03fb61f + 11b757b commit dc6d358

File tree

6 files changed

+18
-8
lines changed

6 files changed

+18
-8
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,8 @@ Topics:
5050
File: policy-responsibility-matrix
5151
- Name: Understanding process and security for OpenShift Dedicated
5252
File: policy-process-security
53-
# - Name: SRE and service account access
54-
# File: osd-sre-access
53+
- Name: SRE and service account access
54+
File: osd-sre-access
5555
- Name: About availability for OpenShift Dedicated
5656
File: policy-understand-availability
5757
- Name: Update life cycle

_topic_maps/_topic_map_rosa.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,8 +67,8 @@ Topics:
6767
File: rosa-life-cycle
6868
- Name: Understanding security for ROSA
6969
File: rosa-policy-process-security
70-
# - Name: SRE and service account access
71-
# File: rosa-sre-access
70+
- Name: SRE and service account access
71+
File: rosa-sre-access
7272
- Name: About IAM resources for ROSA with STS
7373
File: rosa-sts-about-iam-resources
7474
- Name: OpenID Connect Overview

modules/rosa-policy-identity-access-management.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ When SREs are on a VPN through two-factor authentication, they and Red Hat Suppo
5757

5858
* Viewing CloudTrail logs
5959
* Shutting down a faulty EC2 Instance
60-
* Creating EC2 snapshots
6160

6261
All activities performed by SREs arrive from Red Hat IP addresses and are logged to CloudTrail to allow you to audit and review all activity. This role is only used in cases where access to AWS services is required to assist you. The majority of permissions are read-only. However, a select few permissions have more access, including the ability to reboot an instance or spin up a new instance. SRE access is limited to the policy permissions attached to the `ManagedOpenShift-Support-Role`.
6362

osd_architecture/osd_policy/osd-sre-access.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,8 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
55
= SRE and service account access
66

77
toc::[]
8-
include::modules/how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects.adoc[leveloffset=+1]
8+
9+
include::modules/policy-identity-access-management.adoc[leveloffset=+1]
910
include::modules/sre-cluster-access.adoc[leveloffset=+1]
11+
include::modules/how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects.adoc[leveloffset=+1]
12+

osd_architecture/osd_policy/policy-process-security.adoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,10 @@ toc::[]
99

1010
include::modules/policy-incident.adoc[leveloffset=+1]
1111
include::modules/policy-change-management.adoc[leveloffset=+1]
12-
include::modules/policy-identity-access-management.adoc[leveloffset=+1]
1312
include::modules/policy-security-regulation-compliance.adoc[leveloffset=+1]
1413
include::modules/policy-disaster-recovery.adoc[leveloffset=+1]
14+
15+
[role="_additional-resources"]
16+
== Additional resources
17+
18+
* For more information about Red Hat site reliability engineering (SRE) teams access, see xref:../../osd_architecture/osd_policy/osd-sre-access.adoc#policy-identity-access-management_osd-sre-access[Identity and access management].

rosa_architecture/rosa_policy_service_definition/rosa-policy-responsibility-matrix.adoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ include::modules/rosa-policy-shared-responsibility.adoc[leveloffset=+1]
1313

1414
include::modules/rosa-policy-incident.adoc[leveloffset=+1]
1515
include::modules/rosa-policy-change-management.adoc[leveloffset=+1]
16-
include::modules/rosa-policy-identity-access-management.adoc[leveloffset=+1]
1716
include::modules/rosa-policy-security-and-compliance.adoc[leveloffset=+1]
1817
include::modules/rosa-policy-disaster-recovery.adoc[leveloffset=+1]
1918

@@ -23,3 +22,8 @@ include::modules/rosa-policy-disaster-recovery.adoc[leveloffset=+1]
2322
* xref:../../rosa_cluster_admin/rosa_nodes/rosa-nodes-machinepools-about.adoc#rosa-nodes-machinepools-about[About machine pools]
2423
2524
include::modules/rosa-policy-customer-responsibility.adoc[leveloffset=+1]
25+
26+
[role="_additional-resources"]
27+
== Additional resources
28+
29+
* For more information about Red Hat site reliability engineering (SRE) teams access, see xref:../../rosa_architecture/rosa_policy_service_definition/rosa-sre-access.adoc#rosa-policy-identity-access-management_rosa-sre-access[Identity and access management].

0 commit comments

Comments
 (0)