From 4cbf8d0fc15621a6bb62e5987291e8509899cec5 Mon Sep 17 00:00:00 2001 From: Benjamin Ironside Goldstein Date: Mon, 14 Oct 2024 06:39:37 -0700 Subject: [PATCH 1/2] adds emphasis --- docs/cloud-native-security/kspm-get-started.asciidoc | 4 ++-- .../cloud-native-security/get-started-with-kspm.mdx | 4 ++++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc index 9ef78eb193..66a74fd6da 100644 --- a/docs/cloud-native-security/kspm-get-started.asciidoc +++ b/docs/cloud-native-security/kspm-get-started.asciidoc @@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions. -During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*. +IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*. [discrete] [[kspm-use-instance-role]] ==== Option 2 - Use default instance role Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile. -During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. +IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. [discrete] [[kspm-use-keys-directly]] diff --git a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx index 539aee4fe2..8f6ed6d942 100644 --- a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx +++ b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx @@ -130,14 +130,18 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's [EKS Best Practices](https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa) documentation to use the [IAM Role to Kubernetes Service-Account](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) (IRSA) feature to get temporary credentials and scoped permissions. + During setup, do not fill in any option in the "Setup Access" section. Instead click **Save and continue**. +
#### Option 2 - Use default instance role Follow AWS's [IAM roles for Amazon EC2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html) documentation to create an IAM role using the IAM console, which automatically generates an instance profile. + During setup, do not fill in any option in the "Setup Access" section. Click **Save and continue**. +
From b65f3af76a6fbf0624302b766b058b7f3f56c32c Mon Sep 17 00:00:00 2001 From: Benjamin Ironside Goldstein Date: Mon, 14 Oct 2024 07:48:12 -0700 Subject: [PATCH 2/2] makes text the same in both notes --- docs/cloud-native-security/kspm-get-started.asciidoc | 2 +- docs/serverless/cloud-native-security/get-started-with-kspm.mdx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc index 66a74fd6da..7f05da0d61 100644 --- a/docs/cloud-native-security/kspm-get-started.asciidoc +++ b/docs/cloud-native-security/kspm-get-started.asciidoc @@ -128,7 +128,7 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions. -IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*. +IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*. [discrete] [[kspm-use-instance-role]] diff --git a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx index 8f6ed6d942..f94a28d0d6 100644 --- a/docs/serverless/cloud-native-security/get-started-with-kspm.mdx +++ b/docs/serverless/cloud-native-security/get-started-with-kspm.mdx @@ -131,7 +131,7 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y Follow AWS's [EKS Best Practices](https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa) documentation to use the [IAM Role to Kubernetes Service-Account](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) (IRSA) feature to get temporary credentials and scoped permissions. -During setup, do not fill in any option in the "Setup Access" section. Instead click **Save and continue**. +During setup, do not fill in any option in the "Setup Access" section. Click **Save and continue**.