-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[aws-eks] Default masters role #9463
Labels
@aws-cdk/aws-eks
Related to Amazon Elastic Kubernetes Service
feature-request
A feature should be added or improved.
Milestone
Comments
2 tasks
eladb
pushed a commit
that referenced
this issue
Aug 5, 2020
If `mastersRole` is not specified, we now define a default IAM role that can be assumed by anyone (with permissions) in the account. This will allow users to interact with the cluster through `kubectl` by issuing the `aws eks update-kubeconfig` command with the appropriate `--role-arn` option, as specified in the CFN output. Fixes #9463
eladb
pushed a commit
that referenced
this issue
Aug 5, 2020
If `mastersRole` is not specified, we now define a default IAM role that can be assumed by anyone (with permissions) in the account. If `mastersRole` is not specified, we now define a default IAM role that can be assumed by anyone (with permissions) in the account. This will allow users to interact with the cluster through `kubectl` by issuing the `aws eks update-kubeconfig` command with the appropriate `--role-arn` option, as specified in the CFN output. Fixes #9463
github-actions
bot
added
the
@aws-cdk/aws-eks
Related to Amazon Elastic Kubernetes Service
label
Aug 5, 2020
SomayaB
added
in-progress
This issue is being actively worked on.
feature-request
A feature should be added or improved.
labels
Aug 5, 2020
mergify bot
pushed a commit
that referenced
this issue
Aug 5, 2020
If `mastersRole` is not specified, we now define a default IAM role that can be assumed by anyone (with permissions) in the account. This will allow users to interact with the cluster through `kubectl` by issuing the `aws eks update-kubeconfig` command with the appropriate `--role-arn` option, as specified in the CFN output. Fixes #9463 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
eladb
pushed a commit
that referenced
this issue
Aug 10, 2020
If `mastersRole` is not specified, we now define a default IAM role that can be assumed by anyone (with permissions) in the account. This will allow users to interact with the cluster through `kubectl` by issuing the `aws eks update-kubeconfig` command with the appropriate `--role-arn` option, as specified in the CFN output. Fixes #9463 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
@aws-cdk/aws-eks
Related to Amazon Elastic Kubernetes Service
feature-request
A feature should be added or improved.
Today, in order to issue
kubectl
commands against an EKS cluster, themastersRole
must be explicitly defined. This creates quite a lot of friction for users.Moreoever, the
kubectlEnabled
option was confused to "solve" this problem because it falls back to use the stock CFN resource, which grants masters permissions to the user that creates the cluster (so kubectl commands can be issued).To solve this, we should simply auto-generate a masters role if a role is not defined.
The text was updated successfully, but these errors were encountered: