Skip to content

Commit f3ea40d

Browse files
committed
update aws assume roles blog
1 parent b8f2f0b commit f3ea40d

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

posts/how-to-assume-an-aws-iam-role-from-a-service-account-in-eks-with-terraform.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -200,8 +200,8 @@ kubectl exec -ti iam-role-test -- /bin/bash
200200
bash-4.2# aws sts get-caller-identity
201201
{
202202
"UserId": "AROA46FON4H773JH4MPJD:botocore-session-1637837863",
203-
"Account": "889424044543",
204-
"Arn": "arn:aws:sts::889424044543:assumed-role/iam-role-test/botocore-session-1637837863"
203+
"Account": "123456789101",
204+
"Arn": "arn:aws:sts::123456789101:assumed-role/iam-role-test/botocore-session-1637837863"
205205
}
206206
207207
# Check the AWS environment variables
@@ -226,10 +226,11 @@ kubectl exec -ti iam-role-test -- /bin/bash
226226
bash-4.2# aws sts get-caller-identity
227227
{
228228
"UserId": "AROA46FON4H72Q3SPL6SC:i-0d0aff479cf2e2405",
229-
"Account": "889424044543",
229+
"Account": "123456789101",
230230
"Arn": "arn:aws:sts::<ACCOUNT_ID>:assumed-role/<cluster-name>XXXXXXXXX/i-<node-instance-id>"
231231
}
232232
233+
233234
# Check the AWS environment variables
234235
bash-4.2# env | grep "AWS_"
235236
# ... it's empty!

0 commit comments

Comments
 (0)