Difference between revisions of "Eksctl create iamidentitymapping"
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
eksctl create iamidentitymapping --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user | eksctl create iamidentitymapping --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user | ||
+ | [[eksctl create iamidentitymapping --cluster]] <ClusterName> --region=<region-code> --arn <ARN> --username <Username> [[--no-duplicate-arns]] | ||
== Related == | == Related == |
Revision as of 12:18, 31 October 2023
https://eksctl.io/usage/iam-identity-mappings/
eksctl create iamidentitymapping
eksctl create iamidentitymapping --cluster your_cluster_name --region eu-central-1 --arn arn:aws:iam::01234567890:user/your_user --group system:masters
eksctl create iamidentitymapping --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user
eksctl create iamidentitymapping --cluster <ClusterName> --region=<region-code> --arn <ARN> --username <Username> --no-duplicate-arns
Related
eksctl get iamidentitymapping
- KarpenterNode
kubectl -n kube-system get configmap aws-auth -o=yaml
- EKS single sign-on using AWS SSO
- cluster-read-only-role
Activities
- Read https://aws.amazon.com/blogs/containers/a-quick-path-to-amazon-eks-single-sign-on-using-aws-sso/
- ServiceNow: TOI: EKS cluster discovery using STS AssumeRoles (Without AWS CLI)
See also
eksctl create [ cluster | fargateprofile | iamidentitymapping | iamserviceaccount | nodegroup ]
,eksctl create cluster --help
- EKS RBAC, Amazon EKS authentication, Amazon EKS authorization,
aws eks get-token, aws-auth ConfigMap, aws-iam-authenticator, eksctl create iamidentitymapping, eksctl get iamidentitymapping, eks:AccessKubernetesApi, eks-connector
, K8s Cluster roles,AmazonEKSAdminPolicy
,AmazonEKSClusterAdminPolicy
Advertising: