-
Notifications
You must be signed in to change notification settings - Fork 383
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Utilize IAM Roles for AWS Authentication when running inside of AWS #110
Comments
Of note, I believe the standard configuration flow for AWS Clients is as follows: |
@hasheddan is this fixed now with #126? |
@prasek yep! Thanks for flagging 👍 |
A question here. I see the Service account role support has been added that means you can annotate service account and that will in the end bring ENV variables like AWS_ROLE_ARN and AWS_WEB_IDENTITY_TOKEN_FILE to provider-aws pod which it will use to authenticate to AWS API. Which is good but it becomes really hard to do cross account assume. EKS webidentity is somehow fixed to that account where the EKS cluster lives. And unless I'm mistaken, assuming role in another account is done as 2 step process (Call assume role of another account inside pod explicitly leveraging existing Service account role). What was I think instead meant here is with tools like kube2iam kiam its much more simpler to cross account assume without POD even knowing it all you do is add annotation to pod: |
@martin-ducar-gd as you mention, this can be done with a |
Oh great that seems like exactly what might enable that functionality. Thank you @hasheddan |
fix(asg): fix observed failed availability_zones / vpc_zone_identifier
Is this a bug report or feature request?
What should the feature do:
Utilize IAM Roles to authenticate to the AWS API when available.
What is use case behind this feature:
As a engineer, I don't wish to concern myself with the details of securing/rotating security credentials, as such, I want to utilize IAM Roles assigned to the nodes that crossplane is executing on to authenticate to the AWS services. Optionally I want to utilize kube2iam or kiam to manage which IAM role crossplane has access to.
Environment:
Crossplane running inside of a Kubernetes cluster on AWS, with or without kube2iam/kiam installed
The text was updated successfully, but these errors were encountered: