-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use "aws eks get-token" instead of "aws-iam-authenticator" #957
Comments
what error is thrown? |
The error that is thrown:
You'll get an error executing commands with the generated kubeconfig, that encourage you to download aws-iam-authenticator. However, with any aws-cli from the last year and a half, this additional tool is unnecessary, |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had recent activity since being marked as stale. |
Any news on this? |
How you can re-open this issue? |
If it helps promote this issue, I've been using the example implementation from the OP (with a very minor change to kubeconfig_aws_authenticator_command = "aws"
kubeconfig_aws_authenticator_command_args = [
"--region",
var.region,
"eks",
"get-token",
"--cluster-name",
local.kubernetes_cluster
] |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Use
aws eks get-token
instead ofaws-iam-authenticator
Since AWS CLI version 1.16.156,
aws-iam-authenticator
is no longer needed to obtain an auth token for the EKS cluster. This can be performed usingawscli
directly withaws eks get-token
. (reference)I propose changing the default value of
kubeconfig_aws_authenticator_command
andkubeconfig_aws_authenticator_command_args
to:I'm submitting a...
What is the current behavior?
External dependency on
aws-iam-authenticator
tool causesterraform apply
to fail when not installed.This dependency is not clearly indicated in the readme.
If this is a bug, how to reproduce? Please include a code sample if relevant.
Using this module without having installed
aws-iam-authenticator
will throw an error while provisioning the cluster.What's the expected behavior?
No external dependency on
aws-iam-authenticator
.Are you able to fix this problem and submit a PR? Link here if you have already.
Yes
Environment details
Any other relevant info
I'm not sure which tool is more common for this purpose, but our team uses
awscli
whenever possible. Since this functionality is now present inawscli >= 1.16.156
(we are usingv2.0.19
), it might be worthwhile to use it instead ofaws-iam-authenticator
.In any case, whether depending on
awscli
oraws-iam-authenticator
, it might be a good idea to clearly indicate external dependencies in the module readme.The text was updated successfully, but these errors were encountered: