Granting federated user accounts to an EKS cluster
Blog post from Octopus Deploy
Navigating the challenges of adding a federated user account to an existing Elastic Kubernetes Service (EKS) cluster on AWS, this guide by Shawn Sesna outlines the necessary steps and considerations for achieving this integration. When working with EKS clusters created by different accounts, users often face restrictions in accessing detailed deployment resources unless they are added to the aws-auth config map. The guide explains how to create an EKS cluster using AWS CLI in Octopus Deploy and the importance of identifying the AWS role mapped to the federated account. It provides a detailed walkthrough of modifying the aws-auth config map to include federated user roles, emphasizing the need to format the {{SessionName}} correctly to avoid access issues. This process allows federated users to view cluster details, and although troubleshooting may be required for node group health issues, the guide aims to streamline the integration process for users facing similar challenges.