3 réponses
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
I'm not familiar with eksctl
. But, you can research IRSA(IAM Role for Service Account) to solve your problem.
0
You will need to make sure that you are using a supported aws-sdk version for your application to leverage the IRSA feature. You can find out the list of supported aws-sdk versions here: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html
If you are using the support aws-sdk version and are still facing issues, it could be due to the missing aws-java-sdk-sts
dependency in your application. Please review this github issue comment and see if the workaround resolves your issue: https://github.com/aws/aws-sdk-java/issues/2283#issuecomment-854356994
0
Have you tried annotating the service account?
annotations: eks.amazonaws.com/role-arn: arn:aws:iam::<some_account>:role/<irsa_role>
répondu il y a 2 ans
Contenus pertinents
- demandé il y a un an
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a 3 mois
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a un an
I have done that. I have
OIDC
on my cluster, created roles and policies, associated that as a service account.