You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/cloudcraft/getting-started/connect-amazon-eks-cluster-with-cloudcraft.md
+24-36
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,7 @@ title: Connect an Amazon EKS Cluster with Cloudcraft
4
4
5
5
By scanning your Amazon EKS clusters, Cloudcraft allows you to generate system architecture diagrams to help visualize your deployed workloads and pods.
6
6
7
-
Cloudcraft uses the [role-based access control (RBAC) authorization method provided by Kubernetes][1] to authorize [Cloudcraft's existing read-only IAM entity role][2]. That means Cloudcraft requires no special software or agent.
8
-
9
-
To learn more about RBAC configuration and IAM entities, see [Managing users or IAM roles for your cluster][3].
7
+
Cloudcraft uses [access entries][1] to grant [Cloudcraft's existing read-only IAM entity role][2] access to the Kubernetes API. Cloudcraft does not require any special software or agent to be installed on your cluster.
10
8
11
9
<divclass="alert alert-info">The ability to scan Amazon EKS clusters and AWS accounts is only available to Cloudcraft Pro subscribers. Check out <ahref="https://www.cloudcraft.co/pricing">our pricing page</a> for more information.</div>
12
10
@@ -15,48 +13,37 @@ To learn more about RBAC configuration and IAM entities, see [Managing users or
15
13
Before connecting your Amazon EKS clusters with Cloudcraft, you must connect your AWS account and generate diagrams that include your clusters.
16
14
17
15
To connect your AWS account and familiarize yourself with Cloudcraft, see the following articles:
18
-
-[Connect your AWS account with Cloudcraft][4]
19
-
-[Create your first live AWS diagram][5]
16
+
-[Connect your AWS account with Cloudcraft][3]
17
+
-[Crafting Better Diagrams: Cloudcraft's Live Diagramming and Filtering][4]
18
+
19
+
[Install and configure `kubectl`][6], a tool that allows you to control Kubernetes clusters through the command line. Cloudcraft recommends using the latest version to avoid issues.
20
20
21
-
[Install and configure `kubectl`][7], a tool that allows you to control Kubernetes clusters through the command line. Cloudcraft recommends using the latest version to avoid issues.
21
+
In addition, you'll want to [install and configure the AWS CLI][8]to manage your AWS services from the command line. As with `kubectl`, Cloudcraft recommends using the latest version.
22
22
23
-
In addition, in order to scan your cluster successfully, Cloudcraft requires clusters to have public access enabled and no IP filtering applied. The **Public Access Source Allow List** option in the networking configuration must remain set to its default value of 0.0.0.0/0.
23
+
Finally, in order to scan your cluster successfully, Cloudcraft requires clusters to have public access enabled and no IP filtering applied. The **Public Access Source Allow List** option in the networking configuration must remain set to its default value of 0.0.0.0/0.
24
24
25
-
## Authorizing the Cloudcraft IAM role for view-only
25
+
## Create access entries
26
26
27
-
Start by opening a blueprint with an existing Amazon EKS cluster or using the **Auto Layout** feature to generate a new blueprint.
27
+
Start by opening a blueprint with an existing Amazon EKS cluster or creating a new blueprint to scan an account with Amazon EKS clusters.
28
28
29
29
With your AWS environment mapped into a blueprint, select the Amazon EKS cluster that you wish to scan, and click the **Enable cluster scanning** button that appears in the component toolbar.
30
30
31
31
{{< img src="cloudcraft/getting-started/connect-amazon-eks-cluster-with-cloudcraft/enable-cluster-scanning.png" alt="Interactive Cloudcraft diagram showing an AWS EKS cluster with enable cluster scanning button highlighted." responsive="true" style="width:100%;">}}
32
32
33
-
The next screen provides step-by-step commands to run in Terminal.
33
+
The next screen provides step-by-step commands to run in your favorite terminal application.
34
34
35
-
As the Amazon EKS cluster creator or user with admin access, open the aws-auth ConfigMap file with `kubectl`.
35
+
As the Amazon EKS cluster creator or user with admin access, run the following command to map the Cloudcraft IAM role to the Kubernetes group `cloudcraft-view-only`:
36
36
37
37
```
38
-
kubectl edit -n kube-system configmap/aws-auth
39
-
```
40
-
41
-
With the `aws-auth.yaml` file open in a text editor, add the role details to the *mapRoles* section of the file, just after under the *data* section.
If the section does not exist, add it. Once done, save the file and exit.
52
-
53
-
<divclass="alert alert-info">`groups` refer to groups in your cluster to which the role is mapped. For more information, see [Default Roles and Role Bindings][8] in the Kubernetes documentation.</div>
54
-
55
-
<divclass="alert alert-danger">Typos and syntax errors can affect the permissions of all IAM users and roles updated in the ConfigMap file. To prevent this from occuring, Cloudcraft recommends adding a YAML linter to your text editor.</div>
56
43
57
44
## Granting view-only access to the Cloudcraft IAM role
58
45
59
-
Next, use [ClusterRoleBinding][6] to bind the IAM role to a Kubernetes role.
46
+
Next, use [ClusterRoleBinding][5] to bind the IAM role to a Kubernetes role.
60
47
61
48
A ClusterRoleBinding grants permissions defined in a role to a user or set of users in all namespaces in a cluster. Kubernetes defines some default user-facing roles. For Cloudcraft, use the predefined "view" role that allows view-only access to most objects in a namespace.
62
49
@@ -65,6 +52,7 @@ Enter the following multi-line command to create the ClusterRoleBinding and gran
65
52
```
66
53
cat << EOF | kubectl apply -f -
67
54
apiVersion: rbac.authorization.k8s.io/v1
55
+
kind: ClusterRoleBinding
68
56
metadata:
69
57
name: cloudcraft-view-only
70
58
subjects:
@@ -86,11 +74,11 @@ To test that Cloudcraft can access to the cluster, click **Test cluster access**
86
74
87
75
To scan other clusters, repeat the process as many times as needed.
0 commit comments