EC2からEKSに操作するためには、以下のポリシーが必要
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowDescribeCluster",
"Effect": "Allow",
"Action": "eks:DescribeCluster",
"Resource": "*"
},
{
"Sid": "AllowGetCallerIdentity",
"Effect": "Allow",
"Action": "sts:GetCallerIdentity",
"Resource": "*"
}
]
}
eksctlコマンドで実行する時に必要なロール
以下のカスタムロール以外にマネージドポリシーが必要
・AWSCloudFormationFullAccess
・AmazonVPCFullAccess
・AmazonEKSWorkerNodePolicy
・AmazonEKSFargatePodExecutionRolePolicy
・AmazonEKSClusterPolicy
・AmazonEC2FullAccess
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"eks:DescribeClusterVersions",
"eks:DescribeCluster",
"eks:ListClusters",
"eks:UpdateClusterConfig",
"eks:DescribeNodegroup",
"eks:CreateNodegroup",
"eks:DeleteNodegroup",
"eks:UpdateNodegroupConfig",
"eks:DescribeUpdate",
"eks:ListUpdates"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"eks:CreateCluster",
"eks:DeleteCluster"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"eks:TagResource",
"eks:UntagResource"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"eks:CreateFargateProfile",
"eks:DeleteFargateProfile",
"eks:DescribeFargateProfile",
"eks:ListFargateProfiles"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"cloudformation:CreateStack",
"cloudformation:DescribeStacks",
"cloudformation:DescribeStackResources",
"cloudformation:ListStacks",
"cloudformation:DeleteStack"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"iam:CreateRole",
"iam:TagRole",
"iam:AttachRolePolicy",
"iam:PutRolePolicy",
"iam:PassRole"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ec2:CreateVpc",
"ec2:CreateSubnet",
"ec2:CreateInternetGateway",
"ec2:AllocateAddress",
"ec2:DescribeInstances"
],
"Resource": "*"
}
]
}