diff --git a/latest/ug/manage-access/aws-access/associate-service-account-role.adoc b/latest/ug/manage-access/aws-access/associate-service-account-role.adoc index 43b27cdc..93ef405d 100644 --- a/latest/ug/manage-access/aws-access/associate-service-account-role.adoc +++ b/latest/ug/manage-access/aws-access/associate-service-account-role.adoc @@ -61,9 +61,7 @@ Create an IAM role and associate it with a Kubernetes service account. You can u === Create and associate role (eksctl) -Version `{eksctl-min-version}` or later of the `eksctl` command line tool installed on your device or {aws} CloudShell. To install or update `eksctl`, see https://eksctl.io/installation[Installation] in the `eksctl` documentation. - -Replace [.replaceable]`my-service-account` with the name of the Kubernetes service account that you want `eksctl` to create and associate with an IAM role. Replace [.replaceable]`default` with the namespace that you want `eksctl` to create the service account in. Replace [.replaceable]`my-cluster` with the name of your cluster. Replace [.replaceable]`my-role` with the name of the role that you want to associate the service account to. If it doesn't already exist, `eksctl` creates it for you. Replace [.replaceable]`111122223333` with your account ID and [.replaceable]`my-policy` with the name of an existing policy. +This `eksctl` command creates a Kubernetes service account in the specified namespace, creates an IAM role (if it doesn't exist) with the specified name, attaches an existing IAM policy ARN to the role, and annotates the service account with the IAM role ARN. Be sure to replace the sample placeholder values in this command with your specific values. To install or update `eksctl`, see https://eksctl.io/installation[Installation] in the `eksctl` documentation. [source,bash,subs="verbatim,attributes"] ----