LogoLogo
Cocktail Cloud
  • What is Cocktail Cloud?
  • Apply for Service
    • Using Cocktail Cloud
  • overview
    • Kubernetes and Cocktail Cloud
    • Understanding Concepts
      • Platform
      • Workspace
      • Cluster
      • Service Map
      • Image Build
      • Security
      • Monitoring
      • Catalog
  • Getting Started
    • Cluster Creation
      • AWS (EKS)
      • NCP (NKS)
      • Azure (AKS)
      • GCP (GKE)
      • ETC (Datacenter)
    • Cluster Registration
      • AWS (EKS)
      • NCP (NKS)
      • Azure (AKS)
      • GCP (GKE)
      • ETC (Datacenter)
    • Managing Cloud Provider
      • AWS
    • Creating a User
    • Create Service Map
    • Create Registry
      • Create Registry
      • External Registry Registration
        • Setting Up AWS ECR
        • Setting Up Azure ACR
        • Setting Up Docker Hub
        • Setting Up Docker Registry
        • Setting Up Google GCR
        • Setting Up Harbor
        • Setting Up Naver
        • Setting Up Quay
    • Create a Workspace
  • Cluster Backup and Restore
    • Cocktail Backup and Restore
    • Backup/Restore Preparations
      • AWS S3 Configuration
      • Azure Blob Storage Configuration
      • Google Cloud Storage Configuration
      • MinIO Configuration
    • Create storages
    • Backups
    • Restoration
    • Backup/Restore Overview
  • Log Service
    • Cocktail Log Service
    • Installation
      • Install Log Service
      • Registration Log Service
      • Install Log Agent
      • Install Log Operator
    • Setting
      • Change Opensearch Admin password
    • Application Logs
      • Application Management
      • Application logging
        • Automatic instrumentation of container logs
          • Java
          • Python
        • Manual measurement of file logs(SDK)
          • Java
          • Python
        • Manual measurement of file logs (Sidecar)
          • Fluent-bit
    • Container Logs
    • Cluster Audit Logs
    • Troubleshooting
  • CI/CD
    • Creating a Build Server
    • Build Image
    • Setting up a Pipeline
  • application
    • Catalog
    • Application Deployment
    • Configuration Information Creation
    • Volume Requests
    • Service Exposure
    • Ingress
    • Service Mesh Configuration
  • Platform Management
    • Multicluster Configuration
    • Cluster Management
    • Workspace Management
    • Security
    • Integrated Monitoring
  • API Management
    • API Token Issuance
    • API Issuance History
    • API Execution Logs
  • Certificate Management
    • Issuer Management
    • Private Certificate
    • Public Certificate
  • Deepening operations
    • Maintaining Login Session in Case of Inability with Ingress Configuration
    • Add Ingress Proxy Configuration
    • Accessing Harbor from a Server Other Than the Registry VM
    • Configuring Harbor with a Public SSL Certificate
Powered by GitBook

â“’2023. Acornsoft Corp. All rights reserved.

On this page
  • 2) Policy Creation
  • 3) Role Creation
  • 4) Get Access Key and Secret Access Key

Was this helpful?

Export as PDF
  1. Getting Started
  2. Managing Cloud Provider

AWS

PreviousManaging Cloud ProviderNextCreating a User

Last updated 1 year ago

Was this helpful?

To set up AWS IAM users and permissions for provisioning AWS resources, along with creating roles using custom trust policies that IAM users can assume to access resources, follow these steps

User Creation

1) Access the AWS Console and click on "IAM."

2) Click the "Create user" button in the top right corner of the IAM menu.

3) Enter the username.

5) Verify that the user has been created successfully.

6) Copy the ARN (Amazon Resource Name) of the created user.

2) Policy Creation

1) In the IAM menu, navigate to [Access management] - [Policies] and click the "Create policy" button.

2) Click on JSON in the policy editor and edit the policy as needed.

3) Set a name for the policy and click "Create policy."

3) Role Creation

1) In the IAM menu, go to [Access management] - [Roles] and click the "Create role" button.

2) Choose "Trusted entity type" as "Custom trust policy," click "Add" in the "Add trusted entities" section.

3) Add [Principal Entity Types] - [IAM users] & [AWS services].

IAM users : ARN (Amazon Resource Name) of the created user

AWS services: Name of the service you intend to use (e.g., eks)

4) Add the necessary permissions

AmazonEBSCSIDriverPolicy

AmazonEC2FullAccess

AmazonVPCFullAccess

IAMFullAccess

EKSFullPolicy

5) Set a name for the role and click "Create role."

6) Verify the created role.

4) Get Access Key and Secret Access Key

2) Click "Next" under the "Select" section, choose "Other," and click "Next."

3) Enter a description tag for the access key and click "Create access key."

4) Confirm the generated access key and secret access key.

5) Save the generated access key for later use.

4) In the "Permissions" options, select "Add user to group," click "Next," and proceed with the creation.

1) Click on the user with granted permissions, go to the [Security credentials] tab, and click "Create access key" on the top right of the "Access keys" box.

https://console.aws.amazon.com/console
[Link] AWS Console
Logo
[Screen] Accessing the Logged-in Console
[Screen] Role Creation Screen
Adding IAM Users
Adding AWS Services