From 3d50baf10c508016601026bbccdff3ccaf6ac7b4 Mon Sep 17 00:00:00 2001 From: Vishwanath Hiremath Date: Fri, 16 Aug 2024 10:25:31 -0700 Subject: [PATCH] addressing comments Signed-off-by: Vishwanath Hiremath --- .../aws-provider/howto-aws-provider-irsa/index.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/content/guides/operations/providers/aws-provider/howto-aws-provider-irsa/index.md b/docs/content/guides/operations/providers/aws-provider/howto-aws-provider-irsa/index.md index 11e4dadcc..36982f53d 100644 --- a/docs/content/guides/operations/providers/aws-provider/howto-aws-provider-irsa/index.md +++ b/docs/content/guides/operations/providers/aws-provider/howto-aws-provider-irsa/index.md @@ -25,15 +25,15 @@ The AWS provider allows you to deploy and connect to AWS resources from a Radius ## Setup the AWS IAM Roles for Service Accounts(IRSA) for Radius -To authorize Radius to connect to AWS using AWS IAM Roles for Service Accounts(IRSA), you should assign IAM roles to Kubernetes service accounts.To associate an IAM role with a Kubernetes service account Create an IAM role and associate it with a Kubernetes service account. +To authorize Radius to connect to AWS using AWS IAM Roles for Service Accounts(IRSA), you should assign IAM roles to Kubernetes service accounts. To associate an IAM role with a Kubernetes service account Create an IAM role and associate it with a Kubernetes service account. - Go to Identity and Access Management (IAM) on AWS portal and create a new role. {{< image src="create-role.png" width=700px alt="Screenshot of Create Role page in AWS portal" >}} - +
- Select `Trusted entity type` as `Web Identity` and `Identity Provider` as the cluster OIDC url. - {{< image src="select-trust-entity.png" width=1000px alt="Screenshot of options to pass while selecting trust entity." >}} + {{< image src="select-trust-entity.png" width=700px alt="Screenshot of options to pass while selecting trust entity." >}} - Select the created IAM policy to attach to your new role. - Add `Role Name` and create role using the default trust policy. @@ -88,7 +88,7 @@ Now that the setup is complete, you can install Radius with AWS IRSA enabled. 1. Select the "IRSA" option 2. Enter IAM Role ARN.Find the ARN from the role created in the setup step. - {{< image src="get-role-arn.png" width=700px alt="Screenshot of role details to get role ARN." >}} + {{< image src="get-role-arn.png" width=700px alt="Screenshot of role details to get role ARN." >}} 3. Confirm the AWS account ID or provide the account ID you would like to use. 4. Select a region to deploy your AWS resources to.