-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
K8s integration with IAM Role #7
Comments
Possible workaround can be: - name: arn:aws:eks:eu-west-1:123456789:cluster/xxx
user:
exec:
apiVersion: client.authentication.k8s.io/v1alpha1
args:
- session
- --region
- eu-west-1
- eks
- get-token
- --cluster-name
- yyy
- --role
- arn:aws:iam::123456789:role/admin
command: aws-mfa-secure as the alias is blocking somehow the passing of the additional needed arguments |
this will require everyone that using EKS + aws-mfa-secure to update the |
@tongueroo maybe a simple workaround from the for example: |
@tongueroo any estimation here? |
No estimate. Will consider and review PRs. No sweat either way of course 👍 |
When running
aws eks update-kubeconfig
with--role-arn
new entry created under.kube/config
. which contains the following:Any kubectl command or IDE for k8s failed to run due to the fact that
alias aws="aws-mfa-secure session"
contains a space, this caused the kubeconfig to fail the command.My questions are -
session
usage? ( e.gaws-mfa-secure
without thesession
)The text was updated successfully, but these errors were encountered: