-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not require an SSH key to be set #2803
Comments
this caught me out for a while while following the getting started guide for launching the basic cluster in aws. |
I believe its an AWS (API) requirement to assign a private key to each instance. /edit: false. nevermind :) |
We allow re-using a key now. Please let me know if that helps |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/lifecycle frozen |
I've been working on a PR for this as we want to able to output TF code without an SSH key. |
Possible fix in #7096 |
This has been implemented in Kops 1.18.0 |
@rifelpet: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
It would be great to have a flag to disable setting an SSH key when creating AWS Launch Configurations.
Our use case is for a PCI-DSS environment. We are using pre-hardened AMI's that disabled creating default
admin
user accounts, but having a common SSH key associated with each instance raises questions for auditors as to who has access.The text was updated successfully, but these errors were encountered: