Difference between revisions of "Amazon Cloudformation EKS cluster role"
Jump to navigation
Jump to search
Line 30: | Line 30: | ||
Export: | Export: | ||
Name: ![[Sub]] "${AWS::StackName}-RoleArn" | Name: ![[Sub]] "${AWS::StackName}-RoleArn" | ||
+ | |||
+ | == Related == | ||
+ | * <code>[[aws eks create-cluster]] | ||
== See also == | == See also == | ||
* {{EKS}} | * {{EKS}} | ||
+ | |||
+ | [[Category:EKS]] |
Revision as of 21:12, 11 November 2021
https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html#create-service-role
--- AWSTemplateFormatVersion: '2010-09-09' Description: 'Amazon EKS Cluster Role' Resources: MyeksClusterRole: Type: AWS::IAM::Role Properties: AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: - eks.amazonaws.com Action: - sts:AssumeRole ManagedPolicyArns: - arn:aws:iam::aws:policy/AmazonEKSClusterPolicy Outputs: RoleArn: Description: The role that Amazon EKS will use to create AWS resources for Kubernetes clusters Value: !GetAtt MyeksClusterRole.Arn Export: Name: !Sub "${AWS::StackName}-RoleArn"
Related
See also
- EKS,
eksctl
, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize, aws-iam-authenticator
, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage, aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s
, EKS security, EKS Best Practices Guides, hardeneks
, EKS versions, fargate-scheduler
, eks-connector
, Resilience in Amazon EKS, EKS control plane logging, Security groups for Pods in EKS
Advertising: