3 Antworten
- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
0
I'm not familiar with eksctl
. But, you can research IRSA(IAM Role for Service Account) to solve your problem.
0
You will need to make sure that you are using a supported aws-sdk version for your application to leverage the IRSA feature. You can find out the list of supported aws-sdk versions here: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html
If you are using the support aws-sdk version and are still facing issues, it could be due to the missing aws-java-sdk-sts
dependency in your application. Please review this github issue comment and see if the workaround resolves your issue: https://github.com/aws/aws-sdk-java/issues/2283#issuecomment-854356994
0
Have you tried annotating the service account?
annotations: eks.amazonaws.com/role-arn: arn:aws:iam::<some_account>:role/<irsa_role>
beantwortet vor 2 Jahren
Relevanter Inhalt
- Wie stelle ich externen Zugriff auf mehrere Kubernetes-Services in meinem Amazon EKS-Cluster bereit?AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor einem Jahr
- AWS OFFICIALAktualisiert vor 3 Monaten
- AWS OFFICIALAktualisiert vor einem Jahr
I have done that. I have
OIDC
on my cluster, created roles and policies, associated that as a service account.