Skip to content

Commit

Permalink
Add note about deleting nodegroups
Browse files Browse the repository at this point in the history
  • Loading branch information
cPu1 committed Apr 15, 2024
1 parent d50d034 commit 837c8c1
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion userdocs/src/usage/access-entries.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ e.g.

```yaml
accessConfig:
authenticationMode: <>
authenticationMode: <>
```
When creating a new cluster with access entries, using `eksctl`, if `authenticationMode` is not provided by the user, it is automatically set to `API_AND_CONFIG_MAP`. Thus, the access entries API will be enabled by default. If instead you want to use access entries on an already existing, non-eksctl created, cluster, where `CONFIG_MAP` option is used, the user will need to first set `authenticationMode` to `API_AND_CONFIG_MAP`. For that, `eksctl` has introduced a new command for updating the cluster authentication mode, which works both with CLI flags e.g.
Expand Down Expand Up @@ -85,6 +85,9 @@ Each access entry has a type. For authorizing self-managed nodegroups, `eksctl`

When creating your own access entries, you can also specify `EC2_LINUX` (for an IAM role used with Linux or Bottlerocket self-managed nodes), `EC2_WINDOWS` (for an IAM roles used with Windows self-managed nodes), `FARGATE_LINUX` (for an IAM roles used with AWS Fargate (Fargate)), or `STANDARD` as a type. If you don't specify a type, the default type is set to `STANDARD`.

???+ note
When deleting a nodegroup created with a pre-existing `instanceRoleARN`, it is the user's responsibility to delete the corresponding access entry when no more nodegroups are associated with it.

## Managing access entries

### Create access entries
Expand Down

0 comments on commit 837c8c1

Please sign in to comment.