Skip to content

Commit

Permalink
Merge pull request #318 from mmerkes/master
Browse files Browse the repository at this point in the history
Fixes reference to nodegroup CFN template yaml
  • Loading branch information
jimdial-aws committed Feb 22, 2021
2 parents ee6d525 + 89a6a55 commit 27f68f6
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions doc_source/launch-workers.md
Expand Up @@ -67,7 +67,7 @@ This procedure has the following prerequisites:
1. Download the latest version of the AWS CloudFormation template\.

```
curl -o amazon-eks-nodegroup.yaml https://github.com/awslabs/amazon-eks-ami/blob/master/amazon-eks-nodegroup.yaml
curl -o amazon-eks-nodegroup.yaml https://raw.githubusercontent.com/awslabs/amazon-eks-ami/master/amazon-eks-nodegroup.yaml
```

1. Open the AWS CloudFormation console at [https://console\.aws\.amazon\.com/cloudformation](https://console.aws.amazon.com/cloudformation/)\.
Expand Down Expand Up @@ -183,4 +183,4 @@ If you receive any authorization or resource type errors, see [Unauthorized or a

1. \(Optional\) If you plan to assign IAM roles to all of your Kubernetes service accounts so that pods only have the minimum permissions that they need, and no pods in the cluster require access to the Amazon EC2 instance metadata service \(IMDS\) for other reasons, such as retrieving the current Region, then we recommend blocking pod access to IMDS\. For more information, see [IAM roles for service accounts](iam-roles-for-service-accounts.md) and [Restricting access to the IMDS and Amazon EC2 instance profile credentials](best-practices-security.md#restrict-ec2-credential-access)\.

------
------

0 comments on commit 27f68f6

Please sign in to comment.