You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -15,7 +15,7 @@ Verify you have the minimum required version of certain Amazon EKS Add-ons insta
15
15
16
16
Before you begin, ensure you have administrator access to your Amazon EKS cluster and permissions to modify IAM roles. The steps in this topic guide you through enabling Auto Mode using either the {aws-management-console} or {aws} CLI.
Copy file name to clipboardExpand all lines: latest/ug/automode/auto-learn-iam.adoc
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
[.topic]
2
-
[[auto-learn-iam,auto-learn-iam.title]]
2
+
[#auto-learn-iam]
3
3
= Learn about identity and access in EKS Auto Mode
4
4
:info_titleabbrev: Identity and access
5
5
@@ -11,7 +11,7 @@ When you configure EKS Auto Mode, you will need to set up these IAM roles with s
11
11
12
12
In EKS Auto Mode, {aws} IAM roles are automatically mapped to Kubernetes permissions through EKS access entries, removing the need for manual configuration of `aws-auth` ConfigMaps or custom bindings. When you create a new auto mode cluster, EKS automatically creates the corresponding Kubernetes permissions using Access entries, ensuring that {aws} services and cluster components have the appropriate access levels within both the {aws} and Kubernetes authorization systems. This automated integration reduces configuration complexity and helps prevent permission-related issues that commonly occur when managing EKS clusters.
The Cluster IAM role is an {aws} Identity and Access Management (IAM) role used by Amazon EKS to manage permissions for Kubernetes clusters. This role grants Amazon EKS the necessary permissions to interact with other {aws} services on behalf of your cluster, and is automatically configured with Kubernetes permissions using EKS access entries.
@@ -37,7 +37,7 @@ For more information about Kubernetes access, see:
The Node IAM role is an {aws} Identity and Access Management (IAM) role used by Amazon EKS to manage permissions for worker nodes in Kubernetes clusters. This role grants EC2 instances running as Kubernetes nodes the necessary permissions to interact with {aws} services and resources, and is automatically configured with Kubernetes RBAC permissions using EKS access entries.
@@ -74,12 +74,12 @@ For more information, see:
74
74
* <<service-linked-role-permissions-eks>>
75
75
76
76
77
-
[[tag-prop,tag-prop.title]]
77
+
[#tag-prop]
78
78
== Custom {aws} tags for EKS Auto resources
79
79
80
80
By default, the managed policies related to EKS Auto Mode do not permit applying user defined tags to Auto Mode provisioned {aws} resources. If you want to apply user defined tags to {aws} resources, you must attach additional permissions to the Cluster IAM Role with sufficient permissions to create and modify tags on {aws} resources. Below is an example of a policy that will allow unrestricted tagging access:
0 commit comments