You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If we would have pulumi-eks (or pulumi-aws?) expose the creds from the stack config to the environment variables for supporting tools to use then you could benefit from a single source of credentials (the stack config), which is also encrypted.
Affected area/feature
Use of AWS credentials by kubectl
The text was updated successfully, but these errors were encountered:
Hello!
Issue details
When trying to setup an EKS cluster, one cannot only rely on configuring the aws credentials in the stack config (https://www.pulumi.com/registry/packages/aws/installation-configuration/#configuration-options) but must export them to environment variables so
kubectl
will pick them up.If we would have pulumi-eks (or pulumi-aws?) expose the creds from the stack config to the environment variables for supporting tools to use then you could benefit from a single source of credentials (the stack config), which is also encrypted.
Affected area/feature
Use of AWS credentials by kubectl
The text was updated successfully, but these errors were encountered: