3 Answers
- Newest
- Most votes
- Most comments
0
I'm not familiar with eksctl
. But, you can research IRSA(IAM Role for Service Account) to solve your problem.
0
You will need to make sure that you are using a supported aws-sdk version for your application to leverage the IRSA feature. You can find out the list of supported aws-sdk versions here: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html
If you are using the support aws-sdk version and are still facing issues, it could be due to the missing aws-java-sdk-sts
dependency in your application. Please review this github issue comment and see if the workaround resolves your issue: https://github.com/aws/aws-sdk-java/issues/2283#issuecomment-854356994
0
Have you tried annotating the service account?
annotations: eks.amazonaws.com/role-arn: arn:aws:iam::<some_account>:role/<irsa_role>
answered 3 years ago
Relevant content
- asked 3 years ago
- asked 3 months ago
- asked 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 years ago
I have done that. I have
OIDC
on my cluster, created roles and policies, associated that as a service account.