diff --git a/content/master/concepts/managed-resources.md b/content/master/concepts/managed-resources.md index 23c65ec3e..847b98c99 100644 --- a/content/master/concepts/managed-resources.md +++ b/content/master/concepts/managed-resources.md @@ -326,14 +326,14 @@ to a managed resource to determine what permissions Crossplane has over the resource. For example, give Crossplane permission to create and delete an external resource, -but not make any changes set the policies to -{{}}["Create", "Delete"]{{}}. +but not make any changes, set the policies to +{{}}["Create", "Delete", "Observe"]{{}}. ```yaml {label="managementPol1"} apiVersion: ec2.aws.upbound.io/v1beta1 kind: Subnet spec: - managementPolicies: ["Create", "Delete"] + managementPolicies: ["Create", "Delete", "Observe"] forProvider: # Removed for brevity ``` diff --git a/content/v1.13/concepts/managed-resources.md b/content/v1.13/concepts/managed-resources.md index e80a530a3..1dfaaba47 100644 --- a/content/v1.13/concepts/managed-resources.md +++ b/content/v1.13/concepts/managed-resources.md @@ -342,14 +342,14 @@ to a managed resource to determine what permissions Crossplane has over the resource. For example, give Crossplane permission to create and delete an external resource, -but not make any changes set the policies to -{{}}["Create", "Delete"]{{}}. +but not make any changes, set the policies to +{{}}["Create", "Delete", "Observe"]{{}}. ```yaml {label="managementPol1"} apiVersion: ec2.aws.upbound.io/v1beta1 kind: Subnet spec: - managementPolicies: ["Create", "Delete"] + managementPolicies: ["Create", "Delete", "Observe"] forProvider: # Removed for brevity ```