Difference between revisions of "Arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"

From wikieduonline
Jump to navigation Jump to search
 
(3 intermediate revisions by the same user not shown)
Line 2: Line 2:
  
  
[[arn:aws:iam::aws:policy]]/AmazonEKSClusterPolicy, as of Nov 2023 there is an additional of 12 AWS managed policies for EKS.
+
<code>[[arn:aws:iam::aws:policy]]/AmazonEKSClusterPolicy</code>, as of Nov 2023 there is an additional of 12 AWS managed policies for EKS.
 
(Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster.)
 
(Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster.)
 
  https://docs.aws.amazon.com/eks/latest/userguide/security-iam-awsmanpol.html
 
  https://docs.aws.amazon.com/eks/latest/userguide/security-iam-awsmanpol.html
  
Official additional example to view information of the [[configuration tab]].
+
Official additional example to view information of the [[configuration tab]]. <ref>https://docs.aws.amazon.com/eks/latest/userguide/security_iam_id-based-policy-examples.html</ref>
 
  {
 
  {
 
     "Version": "2012-10-17",
 
     "Version": "2012-10-17",
Line 35: Line 35:
 
* [[aws_iam_policy_document]]
 
* [[aws_iam_policy_document]]
 
* [[Terraform EKS]]
 
* [[Terraform EKS]]
 +
* [[AWSServiceRoleForAmazonEKS]]
 +
* [[How Amazon EKS works with IAM]]
  
 
== See also ==
 
== See also ==

Latest revision as of 10:50, 31 October 2023


arn:aws:iam::aws:policy/AmazonEKSClusterPolicy, as of Nov 2023 there is an additional of 12 AWS managed policies for EKS. (Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster.)

https://docs.aws.amazon.com/eks/latest/userguide/security-iam-awsmanpol.html

Official additional example to view information of the configuration tab. [1]

{
   "Version": "2012-10-17",
   "Statement": [
       {
           "Effect": "Allow",
           "Action": [
               "eks:*"
           ],
           "Resource": "*"
       },
       {
           "Effect": "Allow",
           "Action": "iam:PassRole",
           "Resource": "*",
           "Condition": {
               "StringEquals": {
                   "iam:PassedToService": "eks.amazonaws.com"
               }
           }
       }
   ]
}


See also[edit]

  • https://docs.aws.amazon.com/eks/latest/userguide/security_iam_id-based-policy-examples.html
  • Advertising: