Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 10 additions & 7 deletions modules/sd-persistent-storage-csi-efs-sts.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
[id="efs-sts_{context}"]
= Obtaining a role Amazon Resource Name for Security Token Service

[role="_abstract"]
This procedure explains how to obtain a role Amazon Resource Name (ARN) to configure the AWS EFS CSI Driver Operator with {product-title} on AWS Security Token Service (STS).

[IMPORTANT]
Expand Down Expand Up @@ -66,7 +67,6 @@ Perform this procedure before you install the AWS EFS CSI Driver Operator (see _

. Create an IAM trust JSON file with the following content:
+
--
[source,json]
----
{
Expand All @@ -75,12 +75,12 @@ Perform this procedure before you install the AWS EFS CSI Driver Operator (see _
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::<your_aws_account_ID>:oidc-provider/<openshift_oidc_provider>" <1>
"Federated": "arn:aws:iam::<your_aws_account_ID>:oidc-provider/<openshift_oidc_provider>"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"<openshift_oidc_provider>:sub": [ <2>
"<openshift_oidc_provider>:sub": [
"system:serviceaccount:openshift-cluster-csi-drivers:aws-efs-csi-driver-operator",
"system:serviceaccount:openshift-cluster-csi-drivers:aws-efs-csi-driver-controller-sa"
]
Expand All @@ -90,7 +90,11 @@ Perform this procedure before you install the AWS EFS CSI Driver Operator (see _
]
}
----
<1> Specify your AWS account ID and the OpenShift OIDC provider endpoint.
+
--
where:

`Statement.Principal.Federated`:: Specify your AWS account ID and the OpenShift OIDC provider endpoint.
+
Obtain your AWS account ID by running the following command:
+
Expand Down Expand Up @@ -121,7 +125,7 @@ $ openshift_oidc_provider=`oc get authentication.config.openshift.io cluster \
----
endif::openshift-dedicated[]

<2> Specify the OpenShift OIDC endpoint again.
`Statement.Condition.StringEquals[0]`:: Specify the OpenShift OIDC endpoint again.
--

. Create the IAM role:
Expand Down Expand Up @@ -169,10 +173,9 @@ stringData:
credentials: |-
[default]
sts_regional_endpoints = regional
role_arn = <role_ARN> <1>
role_arn = <role_ARN>
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token
----
<1> Replace `role_ARN` with the output you saved while creating the role.

. Create the secret:
+
Expand Down