You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Using EKS without assigning an IAM role to a Node Group
227
+
228
+
If you do not want to assign an IAM role to a Node Group, you can use the IAM role for Service Accounts and configure the snyk-monitor as follows:
229
+
- Setting an IAM role for a service account: [IAM role for a Service Accounts](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html)
230
+
- Modify the fsGroup of the mounted EKS credentials in snyk-monitor to the user `nobody` (uid `65534`)
231
+
- Annotate the snyk-monitor service account with the IAM role
--set rbac.serviceAccount.annotations."eks.amazonaws.com/role-arn"="<iam role name>" \
237
+
--set volumes.projected.serviceAccountToken=true
238
+
```
239
+
226
240
## Using custom CA certificate
227
241
You can provide custom CA certificates to use for validating TLS connections by adding them to a ConfigMap named snyk-monitor-certs. These additional certificates are used when pulling images from container registries.
0 commit comments