-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Description
Background:
I want to provide administrator access to the cluster to other users besides me (the creator).
These other users have a "default" AWS User that assumes an AWS Role (with admin access to the cluster, similar to this setup) that is stored as a profile in their ~/.aws/credentials
file.
They also need to be able to run terraform apply
, but they are getting "Error: Unauthorized", because their default user is used to get the EKS token instead of the Role with admin access to the cluster.
Question:
With the recent change to the kuberenetes.tf
file what would be the proper way to pass a profile (or role) for the aws-iam-authenticator
command?
Using the optional inputs kubeconfig_aws_authenticator_env_variables
or kubeconfig_aws_authenticator_additional_args
to the Terraform EKS module doesn't seem to affect what profile/role is used for authentication with the EKS cluster.