You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/setup_installation/admin/roleChaining.md
+14-2Lines changed: 14 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ In this document we will see how to configure AWS and Hopsworks to use Role chai
10
10
Before you begin this guide you'll need the following:
11
11
12
12
- A Hopsworks cluster running on EKS.
13
-
- Enabled IAM OpenID Connect (OIDC) provider for your cluster.
13
+
- Enabled IAM [OpenID Connect (OIDC) provider](https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html) for your cluster.
14
14
- Administrator account on the Hopsworks cluster.
15
15
16
16
### Step 1: Create an IAM role and associate it with a Kubernetes service account
@@ -21,6 +21,18 @@ For more details on how to create an IAM roles for Kubernetes service accounts s
21
21
!!!note
22
22
To ensure that users can't use the service account role and impersonate the roles by their own means, you need to ensure that the service account is only attached to the hopsworks instance pods.
0 commit comments