Difference between revisions of "Terraform module: ebs csi irsa role"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
|||
(13 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | * https://registry.terraform.io/modules/terraform-aws-modules/iam/aws/5.5.7/examples/iam-role-for-service-accounts-eks | ||
+ | * andreswebs: https://registry.terraform.io/modules/andreswebs/eks-ebs-csi-driver/aws/latest/submodules/iam | ||
+ | .../... | ||
service_account_role_arn = module.ebs_csi_irsa_role.iam_role_arn | service_account_role_arn = module.ebs_csi_irsa_role.iam_role_arn | ||
+ | .../... | ||
+ | module "ebs_csi_irsa_role" { | ||
+ | source = "terraform-aws-modules/iam/aws//modules/[[iam-role-for-service-accounts-eks]]" | ||
+ | |||
+ | role_name = "${var.cluster_name}-ebs-csi" | ||
+ | attach_ebs_csi_policy = true | ||
+ | |||
+ | oidc_providers = { | ||
+ | ex = { | ||
+ | provider_arn = module.eks.[[oidc_provider_arn]] | ||
+ | namespace_service_accounts = ["kube-system:ebs-csi-controller-sa"] | ||
+ | } | ||
+ | } | ||
+ | } | ||
+ | == Activities == | ||
+ | * [[Configure privileges for EBS CSI using ebs csi irsa role module]] | ||
+ | |||
+ | == Related == | ||
+ | * [[Terraform module: iam]] | ||
+ | * [[aws-ebs-csi-driver]] | ||
+ | * [[Error: Invalid module source address]] | ||
+ | * [[Terraform submodule: iam-assumable-role-with-oidc]] | ||
+ | |||
+ | == See also == | ||
+ | * {{ebs_csi_irsa_role}} | ||
* {{EBS CSI}} | * {{EBS CSI}} | ||
+ | * {{IRSA}} | ||
+ | |||
+ | [[Category:EBS]] |
Latest revision as of 15:15, 29 February 2024
- https://registry.terraform.io/modules/terraform-aws-modules/iam/aws/5.5.7/examples/iam-role-for-service-accounts-eks
- andreswebs: https://registry.terraform.io/modules/andreswebs/eks-ebs-csi-driver/aws/latest/submodules/iam
.../... service_account_role_arn = module.ebs_csi_irsa_role.iam_role_arn .../...
module "ebs_csi_irsa_role" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" role_name = "${var.cluster_name}-ebs-csi" attach_ebs_csi_policy = true oidc_providers = { ex = { provider_arn = module.eks.oidc_provider_arn namespace_service_accounts = ["kube-system:ebs-csi-controller-sa"] } } }
Activities[edit]
Related[edit]
- Terraform module: iam
- aws-ebs-csi-driver
- Error: Invalid module source address
- Terraform submodule: iam-assumable-role-with-oidc
See also[edit]
Advertising: