-
Notifications
You must be signed in to change notification settings - Fork 424
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow profiles to be specified #94
Comments
Fixes kubernetes-sigs#94 Signed-off-by: Anthony O'Brien <[email protected]>
Hey @asobrien there is actually support for this built into the Update your config to include: env:
- name: AWS_PROFILE
value: dev more information - https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins#configuration For the PR you submitted maybe we can make that to add documentation to how to configure this instead of adding the flag? |
Perfect, that'd work! I'll verify it works as expected and update the README and docs to specify that profiles can be specified via the |
Thanks! @asobrien |
Fixes kubernetes-sigs#94 Signed-off-by: Anthony O'Brien [email protected]
fix comment alignment on workers_group_defaults
It would be nice if the AWS profile that credentials should be sourced from could be
specified when using
heptio-authenticator-aws
. Of course, this can already be doneby using the
AWS_PROFILE
environment variable. However, adding profiles as anexplicit option would be useful when working with clusters across multiple AWS
accounts and allow seamless switching.
For example, if a
--profile
flag was supported thenkubectl
would not require theAWS_PROFILE
environment variable to be modified for each cluster/account. Theappropriate profile could be specified directly in the kubeconfig file, e.g.:
The text was updated successfully, but these errors were encountered: