Difference between revisions of "Amazon EKS identity-based policy examples"
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
+ | [[arn:aws:iam::aws:policy/AmazonEKSClusterPolicy]] | ||
− | {{EKS}} | + | == See also == |
+ | * {{EKS}} | ||
+ | |||
+ | [[Category:EKS]]] |
Latest revision as of 10:44, 31 October 2023
iam:CreateServiceLinkedRole
iam:PassRole
arn:aws:iam::aws:policy/AmazonEKSClusterPolicy
See also[edit]
- EKS,
eksctl
, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize,aws-iam-authenticator
, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage,aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s
, EKS security, EKS Best Practices Guides,hardeneks
, EKS versions,fargate-scheduler
,eks-connector
, Resilience in Amazon EKS, EKS control plane logging, Security groups for Pods in EKS]
Advertising: