Update aws-auth ConfigMap in clusters created outside of CDK #19753
Labels
@aws-cdk/aws-eks
Related to Amazon Elastic Kubernetes Service
@aws-cdk/aws-iam
Related to AWS Identity and Access Management
feature/coverage-gap
Gaps in CloudFormation coverage by L2 constructs
feature/service-integration
Add functionality to an L2 construct to enable easier integration with another service
feature-request
A feature should be added or improved.
p2
Describe the feature
Add the ability to "import" existing EKS clusters that were created outside of CDK/CloudFormation so that you can use the AddRoleMapping method to update the aws-auth ConfigMap
Use Case
I have inadvertently corrupted the aws-auth ConfigMap when updating it manually. When this happens, I lose access to the cluster and have to manage it using the IAM user/role that was used to provision the cluster. I would like to be able to use the CDK to consistently and correctly apply changes to the ConfigMap.
Proposed Solution
The following should work:
Other Information
No response
Acknowledgements
CDK version used
2.19.0
Environment details (OS name and version, etc.)
MacOS Monterey 12.2.1
The text was updated successfully, but these errors were encountered: