Though you’re administrator of your AWS account, you probably see below warnings when viewing your cluster in EKS console.
Your current user or role does not have access to Kubernetes objects on this EKS cluster.
It’s caused by the Kuberentes has itself RBAC authorization. And AWS uses IAM to grant permissions to users. You have to map your IAM user or role to K8S RBAC authorization to grant the permissions to access K8S resources in EKS cluster.
Above documentation demonstrate how adding IAM roles/users to EKS cluster to grant the roles/users to access K8S resources. However the documentation is not clear to how adding federated users to EKS cluser.
I’m facing two scenarios of federated AWS users to access K8S resources in EKS console,
Finally turn out below configuration to grant both federated users to access K8S resources in EKS console,
apiVersion: v1 data: mapRoles: | - groups: - system:bootstrappers - system:nodes rolearn: arn:aws:iam::123456789012:role/cluster-nodegroup-n-NodeInstanceRole-1OQT1WT84WVS8 # created by eksctl when bootrapping cluster username: system:node: - groups: - eks-console-dashboard-full-access-group rolearn: arn:aws:iam::123456789012:role/Admin # granting the federated user via assuming role username: Admin/kane mapUsers: | - userarn: arn:aws:sts::123456789012:federated-user/kane # granting the federated user via aws-vault username: ops-user groups: - eks-console-dashboard-full-access-group