Difference between revisions of "ServiceNow Kubernetes discovery"
Jump to navigation
Jump to search
(→EKS) |
|||
Line 28: | Line 28: | ||
* [[Access Kubernetes REST API using default token]] | * [[Access Kubernetes REST API using default token]] | ||
* [[Base64]]: <code>[[kubectl get secret]] --namespace default grafana -o jsonpath="{.data.admin-password}" | [[base64 --decode]] ; echo</code> | * [[Base64]]: <code>[[kubectl get secret]] --namespace default grafana -o jsonpath="{.data.admin-password}" | [[base64 --decode]] ; echo</code> | ||
+ | * [[IAM Roles for Service Accounts (IRSA) in EKS]] | ||
== See also == | == See also == |
Revision as of 11:01, 24 October 2023
Contents
EKS
- AWS IAM role. with policy EKSReadOnly
eksctl create iamidentitymapping --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user
2) sn_itom_pattern.k8s_aws_cli_to_generate_token
- With CLI:
aws eks get-token --cluster-name
3)
- sn_itom_pattern.k8s_midserver
- sn_itom_pattern.k8s_create_schedule_enabled
4) XXX
5) ServiceNow AWS Cloud Discovery: https://docs.servicenow.com/en-US/bundle/vancouver-it-operations-management/page/product/discovery/concept/aws-cloud-discovery.html
K8s
kubectl cluster-info
kubectl cluster-info | grep "Kubernetes control plane"
Related
kubectl config view
kubectl cluster-info | grep "Kubernetes control plane"
- Enabling IAM principal access to your cluster
kubectl -n kube-system describe secret
- Access Kubernetes REST API using default token
- Base64:
kubectl get secret --namespace default grafana -o jsonpath="{.data.admin-password}" | base64 --decode ; echo
- IAM Roles for Service Accounts (IRSA) in EKS
See also
Advertising: