Difference between revisions of "Arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
Jump to navigation
Jump to search
↑ https://docs.aws.amazon.com/eks/latest/userguide/security_iam_id-based-policy-examples.html
(13 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
− | + | <code>[[arn:aws:iam::aws:policy]]/AmazonEKSClusterPolicy</code>, as of Nov 2023 there is an additional of 12 AWS managed policies for EKS. | |
+ | (Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster.) | ||
+ | https://docs.aws.amazon.com/eks/latest/userguide/security-iam-awsmanpol.html | ||
+ | Official additional example to view information of the [[configuration tab]]. <ref>https://docs.aws.amazon.com/eks/latest/userguide/security_iam_id-based-policy-examples.html</ref> | ||
+ | { | ||
+ | "Version": "2012-10-17", | ||
+ | "Statement": [ | ||
+ | { | ||
+ | "Effect": "Allow", | ||
+ | "Action": [ | ||
+ | "eks:*" | ||
+ | ], | ||
+ | "Resource": "*" | ||
+ | }, | ||
+ | { | ||
+ | "Effect": "Allow", | ||
+ | "Action": "[[iam:PassRole]]", | ||
+ | "Resource": "*", | ||
+ | "Condition": { | ||
+ | "StringEquals": { | ||
+ | "[[iam:PassedToService]]": "[[eks.amazonaws.com]]" | ||
+ | } | ||
+ | } | ||
+ | } | ||
+ | ] | ||
+ | } | ||
− | * [[Amazon EKS cluster IAM role]] | + | |
+ | * [[Amazon EKS cluster IAM role]]: https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html | ||
+ | * [[Terraform resource]]: <code>[[aws_iam_policy]]</code> | ||
+ | * [[aws_iam_policy_document]] | ||
+ | * [[Terraform EKS]] | ||
+ | * [[AWSServiceRoleForAmazonEKS]] | ||
+ | * [[How Amazon EKS works with IAM]] | ||
== See also == | == See also == | ||
* {{AWS roles}} | * {{AWS roles}} | ||
* {{EKS}} | * {{EKS}} | ||
+ | * {{AWS managed policies}} | ||
[[Category:AWS]] | [[Category:AWS]] |
Latest revision as of 10:50, 31 October 2023
arn:aws:iam::aws:policy/AmazonEKSClusterPolicy
, as of Nov 2023 there is an additional of 12 AWS managed policies for EKS.
(Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster.)
https://docs.aws.amazon.com/eks/latest/userguide/security-iam-awsmanpol.html
Official additional example to view information of the configuration tab. [1]
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "eks:*" ], "Resource": "*" }, { "Effect": "Allow", "Action": "iam:PassRole", "Resource": "*", "Condition": { "StringEquals": { "iam:PassedToService": "eks.amazonaws.com" } } } ] }
- Amazon EKS cluster IAM role: https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html
- Terraform resource:
aws_iam_policy
- aws_iam_policy_document
- Terraform EKS
- AWSServiceRoleForAmazonEKS
- How Amazon EKS works with IAM
See also[edit]
- AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
- EKS,
eksctl
, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize,aws-iam-authenticator
, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage,aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s
, EKS security, EKS Best Practices Guides,hardeneks
, EKS versions,fargate-scheduler
,eks-connector
, Resilience in Amazon EKS, EKS control plane logging - AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, AdministratorAccess, SecurityAudit, ViewBilling, AmazonEKSClusterPolicy
, List of AWS policies
Advertising: