You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/clusters/access-entries.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@ You can use eksctl to manage EKS Access Entries. Use access entries to grant Kub
6
6
7
7
This topic covers how to use eksctl to manage access entries. For general information about access entries, see link:eks/latest/userguide/access-entries.html["Grant IAM users access to Kubernetes with EKS access entries",type="documentation"].
8
8
9
-
You can attach Kubernetes access policies defined by AWS, or assocoiate an IAM Identity with a Kubernetes group.
9
+
You can attach Kubernetes access policies defined by AWS, or associate an IAM Identity with a Kubernetes group.
10
10
11
11
For more information about the available pre-defined policies, see link:eks/latest/userguide/access-policies.html#access-policy-permissions["Associate access policies with access entries",type="documentation"].
12
12
13
-
If you need to define customer Kubernetes policies, associate the IAM Identity with a Kubernetes group, and grant permissions to that group.
13
+
If you need to define custom Kubernetes policies, associate the IAM Identity with a Kubernetes group, and grant permissions to that group.
14
14
15
15
== Cluster authentication mode
16
16
@@ -101,7 +101,7 @@ The integration with access entries for these resources will be achieved behind
101
101
102
102
Each access entry has a type. For authorizing self-managed nodegroups, `eksctl` will create a unique access entry for each nodegroup with the principal ARN set to the node role ARN and type set to either `EC2_LINUX` or `EC2_WINDOWS` depending on nodegroup amiFamily.
103
103
104
-
When creating your own access entries, you can also specify `EC2_LINUX` (for an IAM role used with Linux or Bottlerocket self-managed nodes), `EC2_WINDOWS` (for an IAM roles used with Windows self-managed nodes), `FARGATE_LINUX` (for an IAM roles used with AWS Fargate (Fargate)), or `STANDARD` as a type. If you don't specify a type, the default type is set to `STANDARD`.
104
+
When creating your own access entries, you can also specify `EC2_LINUX` (for an IAM role used with Linux or Bottlerocket self-managed nodes), `EC2_WINDOWS` (for IAM roles used with Windows self-managed nodes), `FARGATE_LINUX` (for IAM roles used with AWS Fargate (Fargate)), or `STANDARD` as a type. If you don't specify a type, the default type is set to `STANDARD`.
105
105
106
106
[NOTE]
107
107
====
@@ -128,7 +128,7 @@ For an example config file for creating access entries, see https://github.com/e
128
128
129
129
== Get access entry
130
130
131
-
The user can retieve all access entries associated with a certain cluster by running one of the following:
131
+
The user can retrieve all access entries associated with a certain cluster by running one of the following:
Copy file name to clipboardExpand all lines: docs/clusters/creating-and-managing-clusters.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ nodeGroups:
95
95
imageBuilder: true
96
96
----
97
97
98
-
The cluster name or nodegroup name must contain only alphanumeric characters (case-sensitive) and hyphens. It must start with an alphabetic character and can't exceed 128 characters, or you will receive a validation error. For more information, see link:AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html["Create a stack from the CloudFormation console",type="documentation"] in the AWS CLoudFormation user guide.
98
+
The cluster name or nodegroup name must contain only alphanumeric characters (case-sensitive) and hyphens. It must start with an alphabetic character and can't exceed 128 characters, or you will receive a validation error. For more information, see link:AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html["Create a stack from the CloudFormation console",type="documentation"] in the AWS CloudFormation user guide.
Copy file name to clipboardExpand all lines: docs/deployment/deployment.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ For the most accurate information about EKS deployment options, see link:eks/lat
17
17
** AWS Outposts is a family of fully managed solutions delivering AWS infrastructure and services to virtually any on-premises or edge location for a truly consistent hybrid experience.
18
18
** AWS Outposts support in eksctl lets you create local clusters with the entire Kubernetes cluster, including the EKS control plane and worker nodes, running locally on AWS Outposts.
19
19
* <<hybrid-nodes>>
20
-
** Run on-premises and edge applications on customer-managed infrastructure with the same AWS EKS clusters, features, and tools you use in the AWS Cloud.
20
+
** Run on-premises and edge applications on customer-managed infrastructure with the same Amazon EKS clusters, features, and tools you use in AWS.
Copy file name to clipboardExpand all lines: docs/iam/iam-policies.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
[#iam-policies]
3
3
= IAM policies
4
4
5
-
You can attach Instance Roles to node groups. Workloads running on the node will receive IAM permissions from the node. For mroe information, see link:AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2,type="documentation"].
5
+
You can attach Instance Roles to node groups. Workloads running on the node will receive IAM permissions from the node. For more information, see link:AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2,type="documentation"].
6
6
7
7
This page lists the pre-defined IAM policy templates available in eksctl. These templates simplify the process of granting your EKS nodes the appropriate AWS service permissions without having to manually create custom IAM policies.
0 commit comments