Difference between revisions of "Aws-auth configMap"

From wikieduonline
Jump to navigation Jump to search
Tags: Mobile web edit, Mobile edit
 
(16 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{lc}}
 
{{lc}}
AWS IAM Authenticator for Kubernetes get information from <code>[[aws-auth]]</code> [[ConfigMap]].
+
[[AWS IAM Authenticator]] for Kubernetes get information from <code>[[aws-auth]]</code> [[ConfigMap]].
 
https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html
 
https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html
  
Line 9: Line 9:
  
 
== Terraform ==
 
== Terraform ==
* [[Terraform EKS module]]: <code>[[create_aws_auth_configmap]]</code>
+
* [[Terraform EKS module]]: <code>[[create_aws_auth_configmap]], [[manage_aws_auth_configmap]]</code>
 +
* [[Terraform resource]]: <code>[[kubernetes_config_map_v1_data]]</code>
  
 
== Errors ==
 
== Errors ==
 
* <code>[[The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session run aws sso login with the corresponding profile.]]</code>
 
* <code>[[The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session run aws sso login with the corresponding profile.]]</code>
 +
* <code>[[Your current user or role does not have access to Kubernetes objects on this EKS cluster]]</code>
 +
* [[Error: Unauthorized]]
 +
 +
== Activities ==
 +
* [[Enabling IAM principal access to your cluster]]
  
 
== Related ==
 
== Related ==
 
* <code>[[eksct create iamidentitymapping]]</code>
 
* <code>[[eksct create iamidentitymapping]]</code>
 
* [[EKS single sign-on using AWS SSO]]
 
* [[EKS single sign-on using AWS SSO]]
* <code>[[aws_auth_roles]]</code>
+
* [[Terraform EKS module]]: <code>[[aws_auth_roles]]</code>
 
* [[Amazon EKS authorization]]
 
* [[Amazon EKS authorization]]
* <code>eksctl get iamidentitymapping --cluster your-eks-cluster</code>
+
* <code>[[eksctl get iamidentitymapping]] --cluster your-eks-cluster</code>
 
* <code>[[Error: getting auth ConfigMap]]: Unauthorized</code>
 
* <code>[[Error: getting auth ConfigMap]]: Unauthorized</code>
 
* <code>[[kind: ClusterRole]]</code>
 
* <code>[[kind: ClusterRole]]</code>
 
* <code>[[HelmRoleArn]]</code> and <code>[[KubernetesRoleArn]]</code>
 
* <code>[[HelmRoleArn]]</code> and <code>[[KubernetesRoleArn]]</code>
 
* <code>[[system:masters]], [[system:serviceaccount:]]</code>
 
* <code>[[system:masters]], [[system:serviceaccount:]]</code>
 +
* <code>[[kubernetes_config_map]]</code>
 +
* <code>[[kubectl get configmap -n kube-system]]</code>
 +
* <code>[[service-account-controller]]</code>
 +
* <code>[[kubectl get clusterroles]]</code>
 +
* <code>[[cluster_endpoint_public_access]]</code>
  
 
== See also ==
 
== See also ==
 
* {{aws-auth}}
 
* {{aws-auth}}
* {{Terraform EKS module}}
 
 
* {{EKS RBAC}}
 
* {{EKS RBAC}}
 +
* {{Kubernetes Authentication}}
  
 
[[Category:EKS]]
 
[[Category:EKS]]

Latest revision as of 08:56, 11 July 2024

AWS IAM Authenticator for Kubernetes get information from aws-auth ConfigMap. https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html

Examples[edit]

Terraform[edit]

Errors[edit]

Activities[edit]

Related[edit]

See also[edit]

Advertising: