mapUsers:
mapUsers: | - userarn: arn:aws:iam::XXXXXXXXXXXX:user/your-aws-user username: your-k8s-new-user-with-master-privileges groups: - system:masters mapRoles: | - rolearn: arn:aws:iam::XXXXXXXXXXXX:role/your-aws-role username: your-new-k8s-user-with-master groups: - system:masters
Examples[edit]
Multiple user example
mapUsers: | - userarn: arn:aws:iam::555555555555:user/your-user-1 username: your-user-1 groups: - system:masters - userarn: arn:aws:iam::555555555555:user/your-user-2 username: your-user-2 groups: - system:masters
mapUsers: | - userarn: arn:aws:iam::123456789:user/read-only-access-eks username: read-only-access-eks groups: - view
Related[edit]
kubectl edit -n kube-system configmap/aws-auth
- Kubernetes API
- Enabling IAM principal access to your cluster
See also[edit]
mapUsers:, mapRoles:, mapAccounts:
- AWS IAM Authenticator for Kubernetes:
aws-auth, kubectl edit -n kube-system configmap/aws-auth, eksctl create iamidentitymapping
,mapUsers:, mapRoles:, mapAccounts:
- Kubernetes RBAC
kubectl auth, kubectl auth can-i, kubectl auth reconcile
kubectl create [ role | clusterrole | clusterrolebinding
|rolebinding | serviceaccount ], groups:
, Kubernetes RBAC good practices,kube2iam
, K8s Cluster roles,rbac.authorization.k8s.io
,system:
Advertising: