Difference between revisions of "Amazon EKS identity-based policy examples"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 5: | Line 5: | ||
[[iam:CreateServiceLinkedRole]] | [[iam:CreateServiceLinkedRole]] | ||
+ | [[iam:PassRole]] | ||
− | {{EKS}} | + | [[arn:aws:iam::aws:policy/AmazonEKSClusterPolicy]] |
+ | |||
+ | == See also == | ||
+ | * {{EKS}} | ||
+ | |||
+ | [[Category:EKS]]] |
Latest revision as of 10:44, 31 October 2023
iam:CreateServiceLinkedRole
iam:PassRole
arn:aws:iam::aws:policy/AmazonEKSClusterPolicy
See also[edit]
- EKS,
eksctl
, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize,aws-iam-authenticator
, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage,aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s
, EKS security, EKS Best Practices Guides,hardeneks
, EKS versions,fargate-scheduler
,eks-connector
, Resilience in Amazon EKS, EKS control plane logging, Security groups for Pods in EKS]
Advertising: