Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross AWS account support #111

Open
bendu opened this issue Dec 1, 2021 · 1 comment
Open

Cross AWS account support #111

bendu opened this issue Dec 1, 2021 · 1 comment
Milestone

Comments

@bendu
Copy link
Contributor

bendu commented Dec 1, 2021

See #105

To better support cross account scenarios, we can add the ability to assume a cross-account role to the controller. Implementation wise, it would be a credential provider that assumes the role specified by an environment variable set on the container.

Once code change is in. Customer would take the follow steps to enable:

  1. Customer creates role in AWS account with permissions to Cloud Map. Role is configured to be assumed by other account.
  2. Customer adds permissions for EKS pod role to assume the role created in step 1.
  3. Customer sets environment variable on controller with arn of role to assume.
@bendu
Copy link
Contributor Author

bendu commented Dec 1, 2021

An alternative approach is for customer to associate the service account to an IAM role in the Cloud Map account. Basically, this depends on the EKS cluster's OIDC provider. This means controller itself needs no changes.

See https://aws.amazon.com/blogs/containers/cross-account-iam-roles-for-kubernetes-service-accounts/

@astaticvoid astaticvoid modified the milestones: 0.2.x, 0.4.0 Dec 3, 2021
@runakash runakash removed the size:L label Jun 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants