Is there a way to avoid aws-iam-authenticator from using keys available as environment variables

11 views
Skip to first unread message

nishan...@appdynamics.com

unread,
May 10, 2019, 11:35:16 PM5/10/19
to kubernetes-sig-aws
Is there a way to avoid aws-iam-authenticator from using keys available as environment variables and use either the profile defined in .kube/config or use role associated to the ec2 instance? 

for e.g. 
even if I use 
- name: test
  user
:
   
exec:
      apiVersion
: client.authentication.k8s.io/v1alpha1
      command
: aws-iam-authenticator
      args
:
     
- token
     
- -i
     
- eks-build
      env
:
     
- name: AWS_PROFILE
        value
: ec2-role

since my env has some aws keys available aws-iam-authenticator tries to use those and not the profile associated in .kube/config. The goal here is to force the aws-iam-authenticator to use role associated to ec2 instance with or without defining 'env' in the .kube/config. Any suggestions will be appreciated.
Reply all
Reply to author
Forward
0 new messages