Skip to content
This repository was archived by the owner on Apr 25, 2024. It is now read-only.

Commit 1d34494

Browse files
committed
minor edits to Clean Up at the end
1 parent 0beabe9 commit 1d34494

File tree

1 file changed

+7
-4
lines changed
  • 04-path-security-and-networking/401-configmaps-and-secrets

1 file changed

+7
-4
lines changed

04-path-security-and-networking/401-configmaps-and-secrets/readme.adoc

+7-4
Original file line numberDiff line numberDiff line change
@@ -684,6 +684,8 @@ AWS Secrets Manager enables you to easily rotate, manage, and retrieve database
684684

685685
=== Update the IAM role for EKS or `kops` Kubernetes Cluster
686686

687+
In this guide, we will create the secret in the US-West (Oregon) `us-west-2` region. AWS Secrets Manager is available in most AWS regions
688+
687689
==== EKS Kubernetes Cluster
688690
EC2 worker nodes use `NodeInstanceRole` created in Step 3 of the https://docs.aws.amazon.com/eks/latest/userguide/getting-started.html[EKS Getting Started guide]. This role must be updated to allow the worked nodes to read the secrets from Secrets Manager.
689691

@@ -699,7 +701,7 @@ In the IAM Console, click `roles` and type `NodeInstanceRole` and click it. In t
699701
"secretsmanager:DescribeSecret"
700702
],
701703
"Resource": [
702-
"arn:aws:secretsmanager:<region>:<account-id>:secret:<secret-name>"
704+
"arn:aws:secretsmanager:us-west-2:<account-id>:secret:<secret-name>"
703705
]
704706
}
705707
]
@@ -723,7 +725,7 @@ and click it. In the `Permissions` tab, expand the inline policy for `nodes.exam
723725
"secretsmanager:DescribeSecret"
724726
],
725727
"Resource": [
726-
"arn:aws:secretsmanager:<region>:<account-id>:secret:<secret-name>"
728+
"arn:aws:secretsmanager:us-west-2:<account-id>:secret:<secret-name>"
727729
]
728730
}
729731
]
@@ -767,8 +769,9 @@ Check the logs of the Pod:
767769

768770
Clean up:
769771

770-
$ kubectl delete -f templates/pod-secretsmanager.yaml
771-
$ aws secretsmanager delete-secret --secret-id testsecret --region us-west-2
772+
- $ kubectl delete -f templates/pod-secretsmanager.yaml
773+
- $ aws secretsmanager delete-secret --secret-id testsecret --region us-west-2
774+
- Delete IAM role policy updates for AWS Secrets Manager
772775

773776
== Secrets using Vault
774777

0 commit comments

Comments
 (0)