-
Notifications
You must be signed in to change notification settings - Fork 807
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor driver permissions docs and add Pod Identities #2281
base: master
Are you sure you want to change the base?
Conversation
Code Coverage DiffThis PR does not change the code coverage |
25ffe05
to
f40eced
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you, this driver permissions section reads much cleaner for new users.
Signed-off-by: Connor Catlett <[email protected]>
f40eced
to
9c3c32e
Compare
New changes are detected. LGTM label has been removed. |
|
||
#### IAM Roles for ServiceAccounts (i.e. IRSA) | ||
|
||
[IAM roles for ServiceAccounts](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) is a method of enabling pods using a Kubernetes ServiceAccount to exhance the service account token for IAM credentials. Using IRSA requires a specially configured trust policy on the role, as well as setup of an OIDC endpoint for the cluster. On EKS, [refer to the EKS docs for setting up IRSA](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html#:~:text=Enable%20IAM%20roles%20for%20service%20accounts%20by%20completing%20the%20following%20procedures:). On other cluster providers, refer to their documentation for steps to setup IRSA. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
np: exchange
What type of PR is this?
/kind documentation
What is this PR about? / Why do we need it?
Cleans up the permissions section of the installation docs, and adds information about EKS Pod Identities.
How was this change tested?
N/A, docs change
Does this PR introduce a user-facing change?