EKS actions require some additional IAM configuration to create a cluster and access it.
Overview
EKS clusters need an associated service-linkedEKS Role to access other AWS services. If such a role does not already exist in the account, Create EKS Role provides instructions on how to create it.
The Target Account requires some privileges beyond PowerUserAccess to use EKS actions. Add Inline Policy to Target Account provides instructions on how to add these privileges.
Managing existing Kubernetes cluster with Fylamynt
If you want to use an existing Kubernetes (k8s) cluster, you must allow one of your Fylamynt Target Accounts (AWS account configured) to access the k8s cluster. This can be done by associating a Target Account (AWS account configured) role ARN with a list of K8s groups (i.e. system:masters, system:basic-user). Please follow the instruction in
The action can be used to create/deploy an EKS Cluster.
The role_arn parameter should match the one from Create Role for EKS Control. The alias should match an alias with the additional inline policy applied.