This product is not supported for your selected Datadog site. ().
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

aws_eks_access_entry

access_entry_arn

Type: STRING
Provider name: accessEntryArn
Description: The ARN of the access entry.

account_id

Type: STRING

cluster_name

Type: STRING
Provider name: clusterName
Description: The name of your cluster.

created_at

Type: TIMESTAMP
Provider name: createdAt
Description: The Unix epoch timestamp at object creation.

kubernetes_groups

Type: UNORDERED_LIST_STRING
Provider name: kubernetesGroups
Description: A name that you’ve specified in a Kubernetes RoleBinding or ClusterRoleBinding object so that Kubernetes authorizes the principalARN access to cluster objects.

modified_at

Type: TIMESTAMP
Provider name: modifiedAt
Description: The Unix epoch timestamp for the last modification to the object.

principal_arn

Type: STRING
Provider name: principalArn
Description: The ARN of the IAM principal for the access entry. If you ever delete the IAM principal with this ARN, the access entry isn’t automatically deleted. We recommend that you delete the access entry with an ARN for an IAM principal that you delete. If you don’t delete the access entry and ever recreate the IAM principal, even if it has the same ARN, the access entry won’t work. This is because even though the ARN is the same for the recreated IAM principal, the roleID or userID (you can see this with the Security Token Service GetCallerIdentity API) is different for the recreated IAM principal than it was for the original IAM principal. Even though you don’t see the IAM principal’s roleID or userID for an access entry, Amazon EKS stores it with the access entry.

tags

Type: UNORDERED_LIST_STRING

type

Type: STRING
Provider name: type
Description: The type of the access entry.

username

Type: STRING
Provider name: username
Description: The name of a user that can authenticate to your cluster.