-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for configuring access_config to support aws_eks_access_policy_association #2881
Comments
We'll have v20 shortly (should be by Monday) |
Figured! Just didn't see an issue for this bit of change. |
I started adding this but there were some issues that have been patched and will go out on 5.34.0 - so we're going to be a bit longer waiting for that release - apologies |
@bryantbiggs @sidewinder12s thanks currently we are using eks cluster access management using aws-auth configmap like below we need to migrate to new cluster access management API... can we migrate existing cluster using the terraform module.. all apps go down right?
|
The module does not yet support access_config. You'll likely be able to migrate to it once its supported without downtime, but it'll depend on how exactly its implemented. |
Thanks @sidewinder12s for the reply looking forward for the module to support |
Yes Bryant has implied he is trying to get this support into the next major release once the provider bugs have been cleared, along with a ton of other backed up requests. |
5.34.0 is released |
Until this feature is released, here is a temporary workaround using the bash and AWS CLI command. If you want to use
Hope this helps! |
added in #2858 |
ah yes, you are correct - its been a long week 😅 |
Is there any example of how you are supposed to specify access_entries with the module? The v20 PR mentions removing the complete example of the module because there are other examples but there are no examples of how to use it and it's an |
ah shoot - yes, I have some. Let me add those in, apologies and to be clear - you don't have to do anything for nodegroups or Fargate profiles. EKS will manage the access entries for EKS managed nodegroups and Fargate profiles, the module will handle the entry for self-managed nodegroups |
We create our IAM Role outside of both the MNG and cluster modules, so when I was trying to grant that role to be a node access entry, I was having a lot of trouble figuring out if I can pass that through the cluster module since all the lookups and try functions appear to dump invalid configs. |
You would just pass the IAM role used by the nodegroup as usual - EKS managed nodegroups will automatically create the access entry when the authentication mode type is |
Am I correct in assuming you can't pass a node access entry through the current logic? (Say I was not using managed node groups at all) |
if you are using a self-managed nodegroup, or say a role used by nodes created by Karpenter - those are two areas where you would create an access entry for nodes. If you are using the self-managed nodegroup sub-module or Karpenter sub-module, you would either let them create the IAM role or provide an existing/external role and the modules will create the access entry for you. If you are not using any of that, you could pass it in via the generic |
I commented on the PR linked to that issue, I think its correct at least for non-Standard access_entry types. Separately I appeared to be running into another bug from the EKS API where it thinks I'm setting kubernetes_groups on my EC2_LINUX type access entry and throwing an error:
At least looking at CloudTrail, it didn't look like Terraform even passed that parameter at all. So I don't think its a Terraform or module issue. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a new offering from AWS?
Is this functionality available in the AWS provider for Terraform? See CHANGELOG.md, too.
Yes: v5.33.0
Is your request related to a problem? Please describe.
Cannot use the new eks_access_policy_associations without modifying the cluster config to support them.
Describe the solution you'd like.
Add support for the
access_config
block on the cluster resource.Describe alternatives you've considered.
Can't configure it otherwise
Additional context
New PR for support in the provider was just landed: hashicorp/terraform-provider-aws#35037
The text was updated successfully, but these errors were encountered: