Dynamic Credentials
Using dynamic credentials
This section contains example Resource Definitions using dynamic credentials for connecting to EKS clusters.
eks-dynamic-credentials.yaml
: use dynamic credentials defined via a Cloud Account. This format is for use with the Humanitec CLIeks-dynamic-credentials.tf
: uses dynamic credentials defined via a Cloud Account. This format is for use with the Humanitec Terraform provider
eks-dynamic-credentials.tf
(view on GitHub)
:
# Connect to an EKS cluster using dynamic credentials defined via a Cloud Account
resource "humanitec_resource_definition" "eks-dynamic-credentials" {
id = "eks-dynamic-credentials"
name = "eks-dynamic-credentials"
type = "k8s-cluster"
driver_type = "humanitec/k8s-cluster-eks"
# The driver_account is referring to a Cloud Account resource
driver_account = humanitec_resource_account.aws-dynamic.id
driver_inputs = {
values_string = jsonencode({
"name" = var.eks_cluster_name
"region" = var.aws_region
"loadbalancer" = var.eks_loadbalancer
"loadbalancer_hosted_zone" = var.eks_loadbalancer_hostedzone
})
}
}
eks-dynamic-credentials.yaml
(view on GitHub)
:
# Connect to an EKS cluster using dynamic credentials defined via a Cloud Account
apiVersion: entity.humanitec.io/v1b1
kind: Definition
metadata:
id: eks-dynamic-credentials
entity:
name: eks-dynamic-credentials
type: k8s-cluster
# The driver_account references a Cloud Account of type "aws-role"
# which needs to be configured for your Organization.
driver_account: aws-temp-creds
# The driver_type k8s-cluster-eks automatically handles the dynamic credentials
# injected via the driver_account.
driver_type: humanitec/k8s-cluster-eks
driver_inputs:
values:
region: eu-central-1
name: demo-123
loadbalancer: x111111xxx111111111x1xx1x111111x-x111x1x11xx111x1.elb.eu-central-1.amazonaws.com
loadbalancer_hosted_zone: ABC0DEF5WYYZ00