Skip to content

Commit 0102d21

Browse files
committed
Simplified topic and section ID syntax.
1 parent d66a572 commit 0102d21

File tree

336 files changed

+1247
-1247
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

336 files changed

+1247
-1247
lines changed

latest/ug/automode/associate-workload.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[associate-workload,associate-workload.title]]
2+
[#associate-workload]
33
= Control if a workload is deployed on EKS Auto Mode nodes
44
:info_titleabbrev: Control deployment
55

latest/ug/automode/auto-configure-alb.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-configure-alb,auto-configure-alb.title]]
2+
[#auto-configure-alb]
33
= Create an IngressClass to configure an Application Load Balancer
44
:info_titleabbrev: Create ingress class
55

@@ -133,7 +133,7 @@ kubectl delete ingress <ingress-name>
133133

134134
EKS Auto Mode will automatically delete the associated load balancer in your {aws} account.
135135

136-
[[ingress-reference,ingress-reference.title]]
136+
[#ingress-reference]
137137
== IngressClassParams Reference
138138

139139
The table below is a quick reference for commonly used configuration options.

latest/ug/automode/auto-configure-nlb.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-configure-nlb,auto-configure-nlb.title]]
2+
[#auto-configure-nlb]
33
= Use Service Annotations to configure Network Load Balancers
44
:info_titleabbrev: Create service
55

latest/ug/automode/auto-disable.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-disable,auto-disable.title]]
2+
[#auto-disable]
33
= Disable EKS Auto Mode
44

55
include::../attributes.txt[]

latest/ug/automode/auto-elb-example.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-elb-example,auto-elb-example.title]]
2+
[#auto-elb-example]
33
= Deploy a Sample Load Balancer Workload to EKS Auto Mode
44
:info_titleabbrev: Deploy load balancer
55

@@ -233,7 +233,7 @@ This will delete all resources in the namespace, including the deployment, servi
233233
** Configures target groups for the pods
234234
** Sets up routing rules to direct traffic to the service
235235

236-
[[auto-elb-troubleshooting,auto-elb-troubleshooting.title]]
236+
[#auto-elb-troubleshooting]
237237
== Troubleshooting
238238

239239
If the game doesn't load:

latest/ug/automode/auto-enable-existing.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-enable-existing,auto-enable-existing.title]]
2+
[#auto-enable-existing]
33
= Enable EKS Auto Mode on an existing cluster
44
:info_titleabbrev: Enable on cluster
55

@@ -15,7 +15,7 @@ Verify you have the minimum required version of certain Amazon EKS Add-ons insta
1515

1616
Before you begin, ensure you have administrator access to your Amazon EKS cluster and permissions to modify IAM roles. The steps in this topic guide you through enabling Auto Mode using either the {aws-management-console} or {aws} CLI.
1717

18-
[[auto-enable-existing-console,auto-enable-existing-console.title]]
18+
[#auto-enable-existing-console]
1919
== {aws-management-console}
2020

2121
You must be logged into the {aws} console with permission to manage IAM, EKS, and EC2 resources.
@@ -100,7 +100,7 @@ aws eks update-cluster-config \
100100
--storage-config '{"blockStorage":{"enabled": true}}'
101101
----
102102

103-
[[auto-addons-required,auto-addons-required.title]]
103+
[#auto-addons-required]
104104
== Required Add-on Versions
105105

106106
If you're planning to enable EKS Auto Mode on an existing cluster, you may need to update certain add-ons. Please note:

latest/ug/automode/auto-glossary.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-glossary,auto-glossary.title]]
2+
[#auto-glossary]
33
= Glossary
44
:info_titleabbrev: Glossary
55

latest/ug/automode/auto-learn-iam.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-learn-iam,auto-learn-iam.title]]
2+
[#auto-learn-iam]
33
= Learn about identity and access in EKS Auto Mode
44
:info_titleabbrev: Identity and access
55

@@ -11,7 +11,7 @@ When you configure EKS Auto Mode, you will need to set up these IAM roles with s
1111

1212
In EKS Auto Mode, {aws} IAM roles are automatically mapped to Kubernetes permissions through EKS access entries, removing the need for manual configuration of `aws-auth` ConfigMaps or custom bindings. When you create a new auto mode cluster, EKS automatically creates the corresponding Kubernetes permissions using Access entries, ensuring that {aws} services and cluster components have the appropriate access levels within both the {aws} and Kubernetes authorization systems. This automated integration reduces configuration complexity and helps prevent permission-related issues that commonly occur when managing EKS clusters.
1313

14-
[[auto-learn-cluster-iam-role,auto-learn-cluster-iam-role.title]]
14+
[#auto-learn-cluster-iam-role]
1515
== Cluster IAM role
1616

1717
The Cluster IAM role is an {aws} Identity and Access Management (IAM) role used by Amazon EKS to manage permissions for Kubernetes clusters. This role grants Amazon EKS the necessary permissions to interact with other {aws} services on behalf of your cluster, and is automatically configured with Kubernetes permissions using EKS access entries.
@@ -37,7 +37,7 @@ For more information about Kubernetes access, see:
3737

3838
* <<access-policy-permissions>>
3939
40-
[[auto-learn-node-iam-role,auto-learn-node-iam-role.title]]
40+
[#auto-learn-node-iam-role]
4141
== Node IAM role
4242

4343
The Node IAM role is an {aws} Identity and Access Management (IAM) role used by Amazon EKS to manage permissions for worker nodes in Kubernetes clusters. This role grants EC2 instances running as Kubernetes nodes the necessary permissions to interact with {aws} services and resources, and is automatically configured with Kubernetes RBAC permissions using EKS access entries.
@@ -74,12 +74,12 @@ For more information, see:
7474
* <<service-linked-role-permissions-eks>>
7575

7676

77-
[[tag-prop,tag-prop.title]]
77+
[#tag-prop]
7878
== Custom {aws} tags for EKS Auto resources
7979

8080
By default, the managed policies related to EKS Auto Mode do not permit applying user defined tags to Auto Mode provisioned {aws} resources. If you want to apply user defined tags to {aws} resources, you must attach additional permissions to the Cluster IAM Role with sufficient permissions to create and modify tags on {aws} resources. Below is an example of a policy that will allow unrestricted tagging access:
8181

82-
[[auto-tag-policy,auto-tag-policy.title]]
82+
[#auto-tag-policy]
8383
.View custom tag policy example
8484
[%collapsible, expand-section="_collapse_all_"]
8585
====

latest/ug/automode/auto-migrate-karpenter.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-migrate-karpenter,auto-migrate-karpenter.title]]
2+
[#auto-migrate-karpenter]
33
= Migrate from Karpenter to EKS Auto Mode using kubectl
44
:info_titleabbrev: Migrate from Karpenter
55

latest/ug/automode/auto-migrate-mng.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[.topic]
2-
[[auto-migrate-mng,auto-migrate-mng.title]]
2+
[#auto-migrate-mng]
33
= Migrate from EKS Managed Node Groups to EKS Auto Mode
44
:info_titleabbrev: Migrate from MNGs
55

0 commit comments

Comments
 (0)