AWS Instance Profile Role Removed from aws-auth Breaks Node Registration
criticalWhen all EKS-managed node groups using a shared instance profile are deleted, AWS removes the instance profile role from aws-auth ConfigMap, breaking Cast AI-managed nodes that rely on the same role for kubelet authentication to the API server.
Monitor node health status transitions to NotReady. Track kubelet authentication errors in node logs (unauthorized errors accessing api-server). Watch for EKS managed node group deletion events. Monitor aws-auth ConfigMap changes for removed roles.
For ConfigMap access mode: re-add the instance profile role to aws-auth ConfigMap with system:bootstrappers and system:nodes groups. For EKS API + ConfigMap mode: add entry to either EKS access entry list or aws-auth ConfigMap. Avoid sharing instance profiles between Cast AI nodes and EKS-managed node groups.