Difference between revisions of "IAM Roles for Service Accounts (IRSA) in EKS"
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
== Related == | == Related == | ||
+ | * [[IAM OIDC]] | ||
* <code>[[enable_irsa]]</code> in [[AWS EKS Terraform module]] | * <code>[[enable_irsa]]</code> in [[AWS EKS Terraform module]] | ||
* [[Terraform module: ebs_csi_irsa_role]] | * [[Terraform module: ebs_csi_irsa_role]] |
Revision as of 11:02, 24 October 2023
IAM Roles for Service Accounts
Activities
- Sep 2019 Read about IRSA for EKS: https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/
- How do I troubleshoot IRSA errors in Amazon EKS? https://repost.aws/knowledge-center/eks-troubleshoot-irsa-errors
- https://www.eksworkshop.com/docs/security/iam-roles-for-service-accounts/add_irsa
Related
- IAM OIDC
enable_irsa
in AWS EKS Terraform module- Terraform module: ebs_csi_irsa_role
karpenter_irsa
podIdentityWebhook
in kOps- Service Accounts: Kubernetes service accounts
- AWS Roles
service_account_role_arn
aws iam list-open-id-connect-providers
See also
- EKS: IRSA, Module:
ebs_csi_irsa_role
,enable_irsa
- AWS Controllers for Kubernetes (ACK), IRSA
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: