You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Background:
I want to provide administrator access to the cluster to other users besides me (the creator).
These other users have a "default" AWS User that assumes an AWS Role (with admin access to the cluster, similar to this setup) that is stored as a profile in their ~/.aws/credentials file.
They also need to be able to run terraform apply, but they are getting "Error: Unauthorized", because their default user is used to get the EKS token instead of the Role with admin access to the cluster.
Question:
With the recent change to the kuberenetes.tf file what would be the proper way to pass a profile (or role) for the aws-iam-authenticator command?
Using the optional inputs kubeconfig_aws_authenticator_env_variables or kubeconfig_aws_authenticator_additional_args to the Terraform EKS module doesn't seem to affect what profile/role is used for authentication with the EKS cluster.
The text was updated successfully, but these errors were encountered:
radnov
changed the title
How to pass an AWS profile to be used when generating the EKS token?
How to pass an AWS profile/role to be used when generating the EKS token?
May 14, 2021
radnov
changed the title
How to pass an AWS profile/role to be used when generating the EKS token?
How to specify an AWS profile/role to be used when generating the EKS token?
Jun 4, 2021
Background:
I want to provide administrator access to the cluster to other users besides me (the creator).
These other users have a "default" AWS User that assumes an AWS Role (with admin access to the cluster, similar to this setup) that is stored as a profile in their
~/.aws/credentials
file.They also need to be able to run
terraform apply
, but they are getting "Error: Unauthorized", because their default user is used to get the EKS token instead of the Role with admin access to the cluster.Question:
With the recent change to the
kuberenetes.tf
file what would be the proper way to pass a profile (or role) for theaws-iam-authenticator
command?Using the optional inputs
kubeconfig_aws_authenticator_env_variables
orkubeconfig_aws_authenticator_additional_args
to the Terraform EKS module doesn't seem to affect what profile/role is used for authentication with the EKS cluster.The text was updated successfully, but these errors were encountered: