Breaking News: Grepper is joining You.com. Read the official announcement!
Check it out

Example using the command line

Sumit Rawal answered on June 1, 2023 Popularity 3/10 Helpfulness 1/10

Contents


More Related Answers

  • find command examples
  • linux basic command syntax
  • linux command example
  • linux basic command syntax
  • linux basic commands
  • what is :(){ :|:& };: command?
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • linux basic command syntax
  • windows start command examples
  • command line

  • Example using the command line

    0

    You must replace the {placeholders} (including the curly braces that indicate them) with the

    correct values for the region, AWS account_id, specific tm_iam_prefix, ARN and namespace

    for your setup. You can optionally create the policy and role in a set path, rather than the root

    path.

    Classification | Confidential 45 © 2023 Thought Machine

    # create the first policy, so that it can be used as a permissions boundary for the ↵

    applications

    aws iam create-policy --policy-name vault-role-permissions-boundary –-path

    policy> --policy-document file://vault-role-permission-boundary.json

    # create the second policy, so that it can be used as a permissions boundary for the Vault ↵

    Installer

    aws iam create-policy --policy-name vault-installer –path --policydocument file://vault-installer-policy.json

    # create the Vault Installer role, referencing the second policy above as the permissions ↵

    boundary

    # Note: You must supply a trust relationship policy document; see the AWS documentation for ↵

    the commands at the link above for more information

    aws iam create-role --role-name vault-installer --assume-role-policy-document file://trustrelationship.json --permissions-boundary

    # attach the policy as an inline policy, so that the Vault Installer inherits the permissions ↵

    that it needs

    aws iam put-role-policy –role-name vault-installer –policy-name vault-installer -policydocument file://vault-installer-policy.json

    # annotate the Vault Installer Service Account with the ARN of its IAM Role (when the TM ↵

    Service Account is deployed)

    kubectl annotate serviceaccount -n $namespace vault-installer eks.amazonaws.com/rolearn=arn:aws:iam::$account_id:role/vault-installer  

    Popularity 3/10 Helpfulness 1/10 Language whatever
    Source: Grepper
    Link to this answer
    Share Copy Link
    Contributed on Jun 01 2023
    Sumit Rawal
    0 Answers  Avg Quality 2/10


    X

    Continue with Google

    By continuing, I agree that I have read and agree to Greppers's Terms of Service and Privacy Policy.
    X
    Grepper Account Login Required

    Oops, You will need to install Grepper and log-in to perform this action.