Difference between revisions of "MapUsers:"
Jump to navigation
Jump to search
Line 30: | Line 30: | ||
== See also == | == See also == | ||
+ | * {{aws-auth maps}} | ||
* {{aws-auth}} | * {{aws-auth}} | ||
* {{K8s RBAC}} | * {{K8s RBAC}} | ||
[[Category:K8s]] | [[Category:K8s]] |
Latest revision as of 14:46, 21 December 2023
mapUsers: | - userarn: arn:aws:iam::XXXXXXXXXXXX:user/your-aws-user username: your-k8s-new-user-with-master-privileges groups: - system:masters mapRoles: | - rolearn: arn:aws:iam::XXXXXXXXXXXX:role/your-aws-role username: your-new-k8s-user-with-master groups: - system:masters
Examples[edit]
Multiple user example
mapUsers: | - userarn: arn:aws:iam::555555555555:user/your-user-1 username: your-user-1 groups: - system:masters - userarn: arn:aws:iam::555555555555:user/your-user-2 username: your-user-2 groups: - system:masters
mapUsers: | - userarn: arn:aws:iam::123456789:user/read-only-access-eks username: read-only-access-eks groups: - view
Related[edit]
kubectl edit -n kube-system configmap/aws-auth
- Kubernetes API
- Enabling IAM principal access to your cluster
See also[edit]
mapUsers:, mapRoles:, mapAccounts:
- AWS IAM Authenticator for Kubernetes:
aws-auth, kubectl edit -n kube-system configmap/aws-auth, eksctl create iamidentitymapping
,mapUsers:, mapRoles:, mapAccounts:
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
Advertising: