I'm trying to configure AWS sso access my EKS clusters that are in a child account that I'm an admin to. I'm referencing this document and this stack posting. But keep getting RBAC errors when I log in with SSO to the child account. How do I properly configure this? I still have IAM access enabled at the moment.
Error in console:
Your current user or role does not have access to Kubernetes objects on this EKS cluster
This may be due to the current user or role not having Kubernetes RBAC permissions to describe cluster resources or not having an entry in the cluster’s auth config map.
Roles:
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: default:sso-admin
namespace: default
rules:
- apiGroups: ["*"]
resources: ["*"]
verbs: ["*"]
ConfigMap:
apiVersion: v1
kind: ConfigMap
metadata:
name: aws-auth
namespace: kube-system
data:
mapUsers: |
- rolearn: arn:aws:iam::xxxxx:role/AWSReservedSSOxxxxx
username: me:{{SessionName}}
groups:
- default:sso-admin