-
Notifications
You must be signed in to change notification settings - Fork 433
Open
Labels
kind/featureCategorizes issue or PR as related to a new feature.Categorizes issue or PR as related to a new feature.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.Indicates that an issue or PR should not be auto-closed due to staleness.
Description
I have an IAM user named Alice, and she's a member of the IAM group eks-admin.
The following configuration works, but when I remove Alice from mapUsers, kubectl commands give me the error error: You must be logged in to the server (Unauthorized).
Can't I add an IAM group to this ConfigMap, just like I can add a user or role?
aws sts get-caller-identity
{
"Account": "123456789012",
"UserId": "AIDAxxxxxxxxxxxxxxx",
"Arn": "arn:aws:iam::123456789012:user/Alice"
}
apiVersion: v1
data:
mapRoles: |
- rolearn: arn:aws:iam::123456789012:role/EKS-WorkerNodes-NodeInstanceRole-1R46GDBD928V5
username: system:node:{{EC2PrivateDNSName}}
groups:
- system:bootstrappers
- system:nodes
mapUsers: |
- userarn: arn:aws:iam::123456789012:user/Alice
username: alice
groups:
- system:masters
- userarn: arn:aws:iam::123456789012:group/eks-admin
username: eks-admin
groups:
- system:masters
cschiewek, gomes, thiago, rcgazevedo, luthes and 110 moreminyeol2
Metadata
Metadata
Assignees
Labels
kind/featureCategorizes issue or PR as related to a new feature.Categorizes issue or PR as related to a new feature.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.Indicates that an issue or PR should not be auto-closed due to staleness.