@@ -82,7 +82,21 @@ Following IAM permissions are the minimum permissions needed for your IAM user o
82
82
" eks:DescribeCluster" ,
83
83
" eks:ListClusters" ,
84
84
" eks:UpdateClusterConfig" ,
85
+ " eks:UpdateClusterVersion" ,
85
86
" eks:DescribeUpdate" ,
87
+ " eks:TagResource" ,
88
+ " eks:UntagResource" ,
89
+ " eks:ListTagsForResource" ,
90
+ " eks:CreateFargateProfile" ,
91
+ " eks:DeleteFargateProfile" ,
92
+ " eks:DescribeFargateProfile" ,
93
+ " eks:ListFargateProfiles" ,
94
+ " eks:CreateNodegroup" ,
95
+ " eks:DeleteNodegroup" ,
96
+ " eks:DescribeNodegroup" ,
97
+ " eks:ListNodegroups" ,
98
+ " eks:UpdateNodegroupConfig" ,
99
+ " eks:UpdateNodegroupVersion" ,
86
100
" iam:AddRoleToInstanceProfile" ,
87
101
" iam:AttachRolePolicy" ,
88
102
" iam:CreateInstanceProfile" ,
@@ -109,13 +123,22 @@ Following IAM permissions are the minimum permissions needed for your IAM user o
109
123
" iam:PutRolePolicy" ,
110
124
" iam:RemoveRoleFromInstanceProfile" ,
111
125
" iam:TagRole" ,
126
+ " iam:UntagRole" ,
112
127
" iam:UpdateAssumeRolePolicy" ,
113
128
// Following permissions are needed if cluster_enabled_log_types is enabled
114
129
" logs:CreateLogGroup" ,
115
130
" logs:DescribeLogGroups" ,
116
131
" logs:DeleteLogGroup" ,
117
132
" logs:ListTagsLogGroup" ,
118
- " logs:PutRetentionPolicy"
133
+ " logs:PutRetentionPolicy" ,
134
+ // Following permissions for working with secrets_encryption example
135
+ " kms:CreateGrant" ,
136
+ " kms:CreateKey" ,
137
+ " kms:DescribeKey" ,
138
+ " kms:GetKeyPolicy" ,
139
+ " kms:GetKeyRotationStatus" ,
140
+ " kms:ListResourceTags" ,
141
+ " kms:ScheduleKeyDeletion"
119
142
],
120
143
"Resource" : " *"
121
144
}
0 commit comments