Why is the aws-auth ConfigMap Deprecated in EKS?

0
8
Asked By CuriousCat42 On

I've noticed that the `aws-auth ConfigMap` is now deprecated and I'm curious to know the reasons behind this change. AWS seems to prefer using EKS access entries instead. Can anyone explain what led to this decision and what benefits the new method offers?

5 Answers

Answered By EKSExpert On

If you're looking for a detailed write-up, check out this article: *https://towardsaws.com/enhancing-eks-access-control-ditch-the-aws-auth-configmap-for-access-entry-91683b47e6fc*. It explains the changes and benefits really well!

Answered By DevGuru77 On

Exactly! The need for existing access to grant access was a major drawback. It was a nightmare for automation since messing up the config could lead to locking yourself out—definitely not ideal. With EKS access entries, you can edit things through the AWS Console or other APIs without ever needing cluster access, making it much more user-friendly and manageable.

PlantLover99 -

Right? And it also allows you to create clusters with empty access entries and add permissions as needed, which solves a lot of issues!

Answered By CodeCrafters On

And let's not forget about Terraform! Managing access with the config map isn't straightforward at all when using it. Access entries make it a lot easier to control everything with infrastructure as code, which is a big plus for developers.

DevGuru77 -

Absolutely! It allows for better integration and management without the stress of facing a support ticket when things go wrong.

Answered By CloudNinja88 On

I've definitely been there—locking myself out of a new cluster because I mistakenly changed the config map. It's good to see AWS taking steps to improve usability. This really does simplify access management for everyone!

Answered By TechWizard01 On

It seems like the community has been asking for changes for years. One of the biggest issues was that the config map was an in-cluster resource, which meant you had to be authenticated to make edits. Plus, when you created a cluster, AWS would automatically add the principal you used to create it as an administrator. This could lock you out of your own cluster if you accidentally deleted the config map. Now, with access entries, AWS has turned this into an API feature and hidden the config map from view, which reduces the chances of locking yourself out. You can manage access without needing to go through the cluster's API, which is a huge relief!

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.