Difference between revisions of "Configuring Pods to use a Kubernetes service account"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 11: | Line 11: | ||
matchLabels: | matchLabels: | ||
app: my-app | app: my-app | ||
− | [[template | + | [[template]]: |
metadata: | metadata: | ||
labels: | labels: | ||
app: my-app | app: my-app | ||
− | spec: | + | [[spec:]] |
[[serviceAccountName]]: my-service-account | [[serviceAccountName]]: my-service-account | ||
containers: | containers: | ||
- name: my-app | - name: my-app | ||
image: public.ecr.aws/nginx/nginx:X.XX | image: public.ecr.aws/nginx/nginx:X.XX | ||
+ | |||
+ | |||
+ | |||
+ | [[kubectl describe pod]] my-app-6f4dfff6cb-76cv9 | grep [[AWS_ROLE_ARN]]: | ||
+ | |||
== Related == | == Related == |
Latest revision as of 17:27, 6 September 2023
apiVersion: apps/v1 kind: Deployment metadata: name: my-app spec: selector: matchLabels: app: my-app template: metadata: labels: app: my-app spec: serviceAccountName: my-service-account containers: - name: my-app image: public.ecr.aws/nginx/nginx:X.XX
kubectl describe pod my-app-6f4dfff6cb-76cv9 | grep AWS_ROLE_ARN:
Related[edit]
- Granting access to an IAM principal to view Kubernetes resources on a cluster
- Kubernetes service account
See also[edit]
- Kubernetes service account, ServiceAccount:,
kubectl get serviceaccounts, kubectl create serviceaccount, kubectl describe serviceaccount
,kubernetes.io/service-account-token
, Kubernetes users, Kubernetes groups, Kubernetes roles,ServiceAccountTokenNodeBinding
- EKS RBAC, Amazon EKS authentication, Amazon EKS authorization,
aws eks get-token, aws-auth ConfigMap, aws-iam-authenticator, eksctl create iamidentitymapping, eksctl get iamidentitymapping, eks:AccessKubernetesApi, eks-connector
, K8s Cluster roles,AmazonEKSAdminPolicy
,AmazonEKSClusterAdminPolicy
Advertising: