Skip to content

Commit c6f00fa

Browse files
Merge pull request #318 from percona/copilot/sub-pr-317
Add OIDC ID extraction guidance for IRSA setup
2 parents 50e758b + e01e83c commit c6f00fa

File tree

2 files changed

+4
-0
lines changed

2 files changed

+4
-0
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,3 +15,4 @@ styles/
1515
# Allow
1616

1717
!styles/config/vocabularies/Percona/**
18+
.cache/

docs/manage/automate-s3-access.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,9 @@ aws iam create-policy --policy-name pbm-s3-access-policy --policy-document file:
161161
This role will be assumed by the Kubernetes service account used by your PBM pods.
162162

163163
First, create a trust policy JSON file (e.g., `pbm-trust-policy.json`). This policy allows your Kubernetes service account to assume the role. Replace `<account-id>`, `<region>`, and `<oidc-id>` with your AWS account ID, EKS cluster region, and the OIDC ID from step 1.
164+
165+
> **Note:** The OIDC ID is the unique identifier at the end of the OIDC issuer URL returned in step 1. For example, if the issuer URL is `https://oidc.eks.us-west-2.amazonaws.com/id/EXAMPLED539D4633E53DE1B71EXAMPLE`, then the OIDC ID is `EXAMPLED539D4633E53DE1B71EXAMPLE`.
166+
164167
```json
165168
{
166169
"Version": "2012-10-17",

0 commit comments

Comments
 (0)