You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'd like to have a feature to migrate existing IAM identities configured in aws-auth configmap to EKS access entries by doing something like below.
eksctl utils migrate-to-access-entry --cluster <cluster-name> --target-authentication-mode <API or API_AND_CONFIGMAP>
When API_AND_CONFIGMAP mode is specified with --target-authentication-mode flag, eksctl will update the cluster auth config to API_AND_CONFIGMAP mode, read from aws-auth configmap and add them to the EKS access entries.
When API mode is specified with --target-authentication-mode flag, eksctl will update the cluster auth config to API mode, read from aws-auth configmap and add them to the EKS access entries, and delete the aws-auth configmap from the cluster (as it is no longer used in API mode).
While migrating the IAM identities,
If the IAM identity is a node IAM role, eksctl will add it to access entries with type as EC2_LINUX, EC2_WINDOWS, or FARGATE_LINUX based on rbac groups configured in aws-auth.
If the IAM identity is a non-node IAM role, eksctl will add it to access entries with type as STANDARD, and use the same rbac groups configured in aws-auth into access entries. For non-node IAM roles with system:masters group, eksctl will add AmazonEKSClusterAdminPolicy to the access entry.
Why do you want this feature?
Existing EKS clusters using CONFIGMAP mode would have multiple IAM mappings, and if cluster admins decide to switch to API mode, they'd have to manually add each entry from aws-auth into access entries, or build some scripts to automate it.
Having this functionality within eksctl would help EKS users to perform this seemlessly with just one command execution.
The text was updated successfully, but these errors were encountered:
Hello veekaly 👋 Thank you for opening an issue in eksctl project. The team will review the issue and aim to respond within 1-5 business days. Meanwhile, please read about the Contribution and Code of Conduct guidelines here. You can find out more information about eksctl on our website
What feature/behavior/change do you want?
I'd like to have a feature to migrate existing IAM identities configured in aws-auth configmap to EKS access entries by doing something like below.
When
API_AND_CONFIGMAP
mode is specified with--target-authentication-mode
flag, eksctl will update the cluster auth config to API_AND_CONFIGMAP mode, read from aws-auth configmap and add them to the EKS access entries.When
API
mode is specified with--target-authentication-mode
flag, eksctl will update the cluster auth config to API mode, read from aws-auth configmap and add them to the EKS access entries, and delete the aws-auth configmap from the cluster (as it is no longer used in API mode).While migrating the IAM identities,
EC2_LINUX
,EC2_WINDOWS
, orFARGATE_LINUX
based on rbac groups configured in aws-auth.STANDARD
, and use the same rbac groups configured in aws-auth into access entries. For non-node IAM roles withsystem:masters
group, eksctl will addAmazonEKSClusterAdminPolicy
to the access entry.Why do you want this feature?
Existing EKS clusters using CONFIGMAP mode would have multiple IAM mappings, and if cluster admins decide to switch to API mode, they'd have to manually add each entry from aws-auth into access entries, or build some scripts to automate it.
Having this functionality within eksctl would help EKS users to perform this seemlessly with just one command execution.
The text was updated successfully, but these errors were encountered: