Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose AWS credentials from stack config to environment so kubectl can use them #694

Open
omercnet opened this issue May 7, 2022 · 0 comments
Labels
kind/enhancement Improvements or new features

Comments

@omercnet
Copy link

omercnet commented May 7, 2022

Hello!

  • Vote on this issue by adding a 👍 reaction
  • If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)

Issue details

When trying to setup an EKS cluster, one cannot only rely on configuring the aws credentials in the stack config (https://www.pulumi.com/registry/packages/aws/installation-configuration/#configuration-options) but must export them to environment variables so kubectl will pick them up.

If we would have pulumi-eks (or pulumi-aws?) expose the creds from the stack config to the environment variables for supporting tools to use then you could benefit from a single source of credentials (the stack config), which is also encrypted.

Affected area/feature

Use of AWS credentials by kubectl

@omercnet omercnet added the kind/enhancement Improvements or new features label May 7, 2022
@jkisk jkisk added kind/enhancement Improvements or new features and removed kind/enhancement Improvements or new features labels May 12, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement Improvements or new features
Projects
None yet
Development

No branches or pull requests

2 participants