Difference between revisions of "ServiceNow Kubernetes discovery"
Jump to navigation
Jump to search
(→EKS) |
(→EKS) |
||
Line 5: | Line 5: | ||
** AWS IAM role. with policy [[EKSReadOnly]] | ** AWS IAM role. with policy [[EKSReadOnly]] | ||
** <code>[[eksctl create iamidentitymapping]] --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user</code> | ** <code>[[eksctl create iamidentitymapping]] --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user</code> | ||
+ | |||
+ | 2) sn_itom_pattern.k8s_aws_cli_to_generate_token | ||
== K8s == | == K8s == |
Revision as of 10:56, 24 October 2023
Contents
EKS
- AWS IAM role. with policy EKSReadOnly
eksctl create iamidentitymapping --cluster yourClusterName --arnarn:aws:iam::yourAccountID:role/yourIAMRoleName --username read-only-user
2) sn_itom_pattern.k8s_aws_cli_to_generate_token
K8s
kubectl cluster-info
kubectl cluster-info | grep "Kubernetes control plane"
Related
kubectl config view
kubectl cluster-info | grep "Kubernetes control plane"
- Enabling IAM principal access to your cluster
kubectl -n kube-system describe secret
- Access Kubernetes REST API using default token
- Base64:
kubectl get secret --namespace default grafana -o jsonpath="{.data.admin-password}" | base64 --decode ; echo
See also
Advertising: