Skip to content

Commit

Permalink
Merge pull request 2i2c-org#4559 from consideRatio/pr/small-refinment
Browse files Browse the repository at this point in the history
aws docs: small refinment to identitymapping docs
  • Loading branch information
consideRatio authored Aug 1, 2024
2 parents cd39794 + 5917fd3 commit 11aec0f
Showing 1 changed file with 13 additions and 5 deletions.
18 changes: 13 additions & 5 deletions docs/hub-deployment-guide/new-cluster/new-cluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -635,9 +635,17 @@ Commit this file to the repo.
````{tab-item} AWS
:sync: aws-key
### Grant additional access
### Grant the deployer's IAM user access
First, we need to grant the freshly created deployer IAM user access to the kubernetes cluster.
```{note}
This still works, but makes use of a deprecated system (`iamidentitymapping` and
`aws-auth` ConfigMap in kube-system namespace) instead of the new system called
[EKS access entries]. Migrating to the new system is [tracked by this github issue](https://github.com/2i2c-org/infrastructure/issues/4558).
[eks access entries]: https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html
```
We need to grant the freshly created deployer IAM user access to the kubernetes cluster.
1. As this requires passing in some parameters that match the created cluster,
we have a `terraform output` that can give you the exact command to run.
Expand Down Expand Up @@ -677,9 +685,9 @@ First, we need to grant the freshly created deployer IAM user access to the kube
### (no longer needed) Grant `eksctl` access to other users
Use of `eksctl create iamidentitymapping` was previously required step to grant
access to other engineers, but after AWS introduced a new system in parallel to
the now deprecated `iamidentitymapping` system, it seems AWS account admin users
are no longer required to be granted access like this.
access to other engineers, but after AWS introduced a new system (EKS access
entries) in parallel to the now deprecated `iamidentitymapping` system, it seems
AWS account admin users are no longer required to be granted access like this.
To conclude, any AWS account admin authenticated should be able to acquire k8s
cluster credentials like below without use of `eksctl create iamidentitymapping`:
Expand Down

0 comments on commit 11aec0f

Please sign in to comment.