You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To better support cross account scenarios, we can add the ability to assume a cross-account role to the controller. Implementation wise, it would be a credential provider that assumes the role specified by an environment variable set on the container.
Once code change is in. Customer would take the follow steps to enable:
Customer creates role in AWS account with permissions to Cloud Map. Role is configured to be assumed by other account.
Customer adds permissions for EKS pod role to assume the role created in step 1.
Customer sets environment variable on controller with arn of role to assume.
The text was updated successfully, but these errors were encountered:
An alternative approach is for customer to associate the service account to an IAM role in the Cloud Map account. Basically, this depends on the EKS cluster's OIDC provider. This means controller itself needs no changes.
See #105
To better support cross account scenarios, we can add the ability to assume a cross-account role to the controller. Implementation wise, it would be a credential provider that assumes the role specified by an environment variable set on the container.
Once code change is in. Customer would take the follow steps to enable:
The text was updated successfully, but these errors were encountered: