AWSManagedCluster should support granting additional IAM roles access to the EKS cluster #1850
Labels
area/provider/eks
Issues or PRs related to Amazon EKS provider
area/security
Issues or PRs related to security
kind/feature
Categorizes issue or PR as related to a new feature.
lifecycle/active
Indicates that an issue or PR is actively being worked on by a contributor.
Milestone
/kind feature
Describe the solution you'd like
By default, only the IAM entity that has access to an EKS cluster is the entity that created it. Additional IAM roles must be added manually using an
aws-auth
ConfigMap in thekube-system
namespace.It would be great if we could specify additional roles (maybe users, too?) in the spec and have that ConfigMap be set up automatically.
Anything else you would like to add:
Find information about the format of the auth configuration here: https://github.com/kubernetes-sigs/aws-iam-authenticator#full-configuration-format
The text was updated successfully, but these errors were encountered: