console에서 workload 보이게 하기 <1> 순서 대로 1 role arn 확인 rolearn=$(aws cloud9 describe-environment-memberships --environment-id=$C9_PID | jq -r '.memberships[].userArn') echo ${rolearn} 2 값을 불렀을 때, assumed-role이 있다면 아래의 작업을 추가적으로 수행 assumedrolename=$(echo ${rolearn} | awk -F/ '{print $(NF-1)}') rolearn=$(aws iam get-role --role-name ${assumedrolename} --query Role.Arn --output text) echo ${rolearn} 3 매핑 eksctl create iamidentitymapping --cluster eks-demo --arn ${rolearn} --group system:masters --username admin 4 정보 확인 kubectl describe configmap -n kube-system aws-auth <2> 1줄 요약 1 설정 eksctl create iamidentitymapping --cluster eks-demo --arn arn:aws:iam::22222222222:role/seo-administrator-role --group system:masters --username admin // 리전 , 클러스터 이름 , account id , role 4를 맟추어 준다. 2 확인 seo-administrator-role:~/environment $ kubectl describe configmap -n kube-system aws-auth Name: aws-auth Namespace: kube-system Labels: Annotations: Data ==== mapRoles: ---- - groups: - system:bootstrappers - system:nodes rolearn: arn:aws:iam::22222222:role/eksctl-eks-demo-nodegroup-node-gr-NodeInstanceRole-1EVHH6VHYXA username: system:node:{{EC2PrivateDNSName}} - groups: - system:masters rolearn: arn:aws:iam::22222222:role/seo-administrator-role username: admin mapUsers: ---- [] Events: