AK
Size: a a a
AK
ИБ
DS
DS
DS
DS
DS
ИБ
DS
averageUtilization
AK
VA
z
VA
VA
z
<ARN of instance role (not instance profile)>
может тут ошибсяVA
const awsConsoleAccess = [
{
apiVersion: "rbac.authorization.k8s.io/v1",
kind: "ClusterRole",
metadata: { name: "aws-console-ro" },
rules: [
{
apiGroups: ["", "apps"],
resources: ["services", "endpoints", "pods", "deployments", "ingress", "namespaces", "nodes"],
verbs: ["get", "list", "watch"]
},
{
apiGroups: ["apps"],
resources: ["services", "endpoints", "pods", "deployments", "ingress", "namespaces", "daemonsets", "replicasets", "statefulsets"],
verbs: ["get", "list", "watch"]
},
{
apiGroups: ["batch"],
resources: ["jobs"],
verbs: ["get", "list", "watch"]
}
]
},
{
apiVersion: "rbac.authorization.k8s.io/v1",
kind: "ClusterRoleBinding",
metadata: { name: "aws-console-ro" },
subjects: [
{
kind: "Group",
name: "aws-console-ro",
apiGroup: "rbac.authorization.k8s.io"
}
],
roleRef: {
kind: "ClusterRole",
name: "aws-console-ro",
apiGroup: "rbac.authorization.k8s.io"
}
}
];
this.cluster.addManifest('AWSConsoleROAccess', ...awsConsoleAccess);
this.cluster.awsAuth.addRoleMapping(iam.Role.fromRoleArn(this, 'AdminUser', `arn:aws:iam::${this.config.aws_account}:role/Local_Administration`),
{
username: 'Local_Administration/{{SessionName}}',
groups: ['aws-console-ro']
}
);
this.cluster.awsAuth.addRoleMapping(iam.Role.fromRoleArn(this, 'ReadOnlyUser', `arn:aws:iam::${this.config.aws_account}:role/ReadOnly`),
{
username: 'ReadOnly/{{SessionName}}',
groups: ['aws-console-ro']
}
);
z
const awsConsoleAccess = [
{
apiVersion: "rbac.authorization.k8s.io/v1",
kind: "ClusterRole",
metadata: { name: "aws-console-ro" },
rules: [
{
apiGroups: ["", "apps"],
resources: ["services", "endpoints", "pods", "deployments", "ingress", "namespaces", "nodes"],
verbs: ["get", "list", "watch"]
},
{
apiGroups: ["apps"],
resources: ["services", "endpoints", "pods", "deployments", "ingress", "namespaces", "daemonsets", "replicasets", "statefulsets"],
verbs: ["get", "list", "watch"]
},
{
apiGroups: ["batch"],
resources: ["jobs"],
verbs: ["get", "list", "watch"]
}
]
},
{
apiVersion: "rbac.authorization.k8s.io/v1",
kind: "ClusterRoleBinding",
metadata: { name: "aws-console-ro" },
subjects: [
{
kind: "Group",
name: "aws-console-ro",
apiGroup: "rbac.authorization.k8s.io"
}
],
roleRef: {
kind: "ClusterRole",
name: "aws-console-ro",
apiGroup: "rbac.authorization.k8s.io"
}
}
];
this.cluster.addManifest('AWSConsoleROAccess', ...awsConsoleAccess);
this.cluster.awsAuth.addRoleMapping(iam.Role.fromRoleArn(this, 'AdminUser', `arn:aws:iam::${this.config.aws_account}:role/Local_Administration`),
{
username: 'Local_Administration/{{SessionName}}',
groups: ['aws-console-ro']
}
);
this.cluster.awsAuth.addRoleMapping(iam.Role.fromRoleArn(this, 'ReadOnlyUser', `arn:aws:iam::${this.config.aws_account}:role/ReadOnly`),
{
username: 'ReadOnly/{{SessionName}}',
groups: ['aws-console-ro']
}
);
AK
AK
AK
/scale
subresource).