Difference between revisions of "System:masters"
Jump to navigation
Jump to search
(2 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
+ | [[Terraform EKS]] | ||
{{aws_auth_users_example}} | {{aws_auth_users_example}} | ||
== Related == | == Related == | ||
− | * [[system:]] | + | * <code>[[system:]]</code> |
− | * [[system:controller:]] | + | * <code>[[system:anonymous]]</code> |
+ | * <code>[[system:controller:]]</code> | ||
* [[K8s Cluster roles]] | * [[K8s Cluster roles]] | ||
− | * [[aws-auth]] | + | * <code>[[aws-auth]]</code> |
== See also == | == See also == |
Latest revision as of 14:50, 21 December 2023
system:masters
aws_auth_users = [ { userarn = "arn:aws:iam::66666666666:user/user1" username = "user1" groups = ["system:masters"] }, { userarn = "arn:aws:iam::66666666666:user/user2" username = "user2" groups = ["system:masters"] }, ]
Related[edit]
See also[edit]
system:, system:masters, system:controller:, system:anonymous, system:serviceaccount:, system:serviceaccounts:, system:bootstrappers, system:node, system:nodes
,kubectl get clusterroles
- AWS IAM Authenticator for Kubernetes:
aws-auth, kubectl edit -n kube-system configmap/aws-auth, eksctl create iamidentitymapping
,mapUsers:, mapRoles:, mapAccounts:
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
Advertising: