mirror of
https://github.com/davegallant/davegallant.github.io.git
synced 2025-10-07 01:46:00 +00:00
Compare commits
2 Commits
6bf8ef3c43
...
1650e7f3f8
Author | SHA1 | Date | |
---|---|---|---|
|
1650e7f3f8 | ||
|
a2d6ebac07 |
@@ -49,7 +49,7 @@ resource "aws_iam_openid_connect_provider" "eks" {
|
|||||||
|
|
||||||
# IAM
|
# IAM
|
||||||
resource "aws_iam_role" "ebs_csi_driver" {
|
resource "aws_iam_role" "ebs_csi_driver" {
|
||||||
name = "${var.environment_name}-ebs-csi-driver"
|
name = "ebs-csi-driver"
|
||||||
assume_role_policy = data.aws_iam_policy_document.ebs_csi_driver_assume_role.json
|
assume_role_policy = data.aws_iam_policy_document.ebs_csi_driver_assume_role.json
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -87,6 +87,6 @@ resource "aws_iam_role_policy_attachment" "AmazonEBSCSIDriverPolicy" {
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
The above configuration follows the docs, binding an IAM role to the service account _kube-system/ebs-csi-controller-sa_ using an OpenID connect provider.
|
The above configuration follows the docs, binding an IAM role to the service account `kube-system/ebs-csi-controller-sa` using an OpenID connect provider.
|
||||||
|
|
||||||
After applying the changes above, I deployed [the sample application](https://docs.aws.amazon.com/eks/latest/userguide/ebs-sample-app.html) and noticed that the persistent volume claims were bound to EBS volumes.
|
After applying the changes above, I deployed [the sample application](https://docs.aws.amazon.com/eks/latest/userguide/ebs-sample-app.html) and noticed that the persistent volume claims were bound to EBS volumes.
|
||||||
|
6
package-lock.json
generated
6
package-lock.json
generated
@@ -2745,9 +2745,9 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"node_modules/flexsearch": {
|
"node_modules/flexsearch": {
|
||||||
"version": "0.7.31",
|
"version": "0.7.43",
|
||||||
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.31.tgz",
|
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.43.tgz",
|
||||||
"integrity": "sha512-XGozTsMPYkm+6b5QL3Z9wQcJjNYxp0CYn3U1gO7dwD6PAqU1SVWZxI9CCg3z+ml3YfqdPnrBehaBrnH2AGKbNA=="
|
"integrity": "sha512-c5o/+Um8aqCSOXGcZoqZOm+NqtVwNsvVpWv6lfmSclU954O3wvQKxxK8zj74fPaSJbXpSLTs4PRhh+wnoCXnKg=="
|
||||||
},
|
},
|
||||||
"node_modules/foreground-child": {
|
"node_modules/foreground-child": {
|
||||||
"version": "3.1.1",
|
"version": "3.1.1",
|
||||||
|
12
themes/custom-theme/package-lock.json
generated
12
themes/custom-theme/package-lock.json
generated
@@ -2721,9 +2721,9 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"node_modules/flexsearch": {
|
"node_modules/flexsearch": {
|
||||||
"version": "0.7.31",
|
"version": "0.7.43",
|
||||||
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.31.tgz",
|
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.43.tgz",
|
||||||
"integrity": "sha512-XGozTsMPYkm+6b5QL3Z9wQcJjNYxp0CYn3U1gO7dwD6PAqU1SVWZxI9CCg3z+ml3YfqdPnrBehaBrnH2AGKbNA=="
|
"integrity": "sha512-c5o/+Um8aqCSOXGcZoqZOm+NqtVwNsvVpWv6lfmSclU954O3wvQKxxK8zj74fPaSJbXpSLTs4PRhh+wnoCXnKg=="
|
||||||
},
|
},
|
||||||
"node_modules/foreground-child": {
|
"node_modules/foreground-child": {
|
||||||
"version": "3.1.1",
|
"version": "3.1.1",
|
||||||
@@ -8483,9 +8483,9 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"flexsearch": {
|
"flexsearch": {
|
||||||
"version": "0.7.31",
|
"version": "0.7.43",
|
||||||
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.31.tgz",
|
"resolved": "https://registry.npmjs.org/flexsearch/-/flexsearch-0.7.43.tgz",
|
||||||
"integrity": "sha512-XGozTsMPYkm+6b5QL3Z9wQcJjNYxp0CYn3U1gO7dwD6PAqU1SVWZxI9CCg3z+ml3YfqdPnrBehaBrnH2AGKbNA=="
|
"integrity": "sha512-c5o/+Um8aqCSOXGcZoqZOm+NqtVwNsvVpWv6lfmSclU954O3wvQKxxK8zj74fPaSJbXpSLTs4PRhh+wnoCXnKg=="
|
||||||
},
|
},
|
||||||
"foreground-child": {
|
"foreground-child": {
|
||||||
"version": "3.1.1",
|
"version": "3.1.1",
|
||||||
|
Reference in New Issue
Block a user