-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws eks update-kubeconfig does not support external_id
#4053
Comments
@benderillo - Thank you for your post. For the CLI to support external_id in As to Marked this issue as a feature request with a dependency but closing it because the authenticator does not support it at this time. |
@justnance What do I do to re-open the issue? It seems the authenticator has added support for external_id here: kubernetes-sigs/aws-iam-authenticator#228 |
I am glad to see this re-open. Hopefully, we can get this implemented in some not so distant future, the future where the world will have become a bit better place because |
Greetings! It looks like this issue hasn’t been active in longer than one year. We encourage you to check if this is still an issue in the latest release. In the absence of more information, we will be closing this issue soon. If you find that this is still a problem, please feel free to provide a comment or upvote with a reaction on the initial post to prevent automatic closure. If the issue is already closed, please feel free to open a new one. |
Is this issue actually fixed, I still don't see option to pass external id? |
I need this feature. |
@justnance and @kdaily Is there a way to reopen this ticket if external id is still not supported? To make it very clear, this request is to add a new optional parameter to /open |
I am of the same opinion. |
Reopening issue for further review |
I took the initiative to create a PR because I want to solve your problems. |
+1 |
There is no way at the moment to specify
external_id
when callingaws eks update-kubeconfig
.It supports specifying
role-arn
for the case when the cluster was created with assumed role.However, if the role has an extra condition like:
StringEquals | sts:ExternalId | test_account
there is no way to supplyaws eks update-kubeconfig
this info.It seems that the problem is even wider, I do not see support fo
external_id
inaws-iam-authenticator token
either.Basically, here is the use case:
We use terraform with assumed role (that has external_id condition set) to bring up EKS cluster and worker nodes.
In order to finish the setup, we need to do
kubectl apply
of the ConfigMap with AWS Auth to let nodes join the cluster.In order to do so, we first need to prepare
.kubeconfig
that will use the same role, that terraform assumed to create the cluster.Unfortunately, there is no way to specify
external_id
there and attempts to executekubectl apply
fail withTo sum up, this issue is a feature request to add ability to specify
external_id
when providingrole-arn
toaws eks update-kubeconfig
.I am not sure how to go about highlighting the same problem to
aws-iam-authenticator
though.The text was updated successfully, but these errors were encountered: