-
Notifications
You must be signed in to change notification settings - Fork 824
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
REQUEST: Need for AWS account for hosting CAPA generated AMIs #5010
Comments
Hey @dims 👋 |
+1 from me! |
@Ankitasw who owns the current account ? |
VMware owns the current account and hence we need a new one such that others also has access to the account |
I'm not sure if it's the amount we are looking for, but I did notice we migrated "cncf-k8s-infra-aws-capa-ami" account from the CNCF AWS Org to Kubernetes AWS AWS Org a while back: #4626 (comment) The password for export AWS_PROFILE=hh@kubernetes
aws organizations describe-account --account-id 819546954734
|
@dims / @ameukam Here is the 1Password Kubernetes community Vault and entry for the account. Share as you see fit. I'd like to find a way to manage ongoing access to 1Password Vault entries so passwords can be updated and shared more easily.
Check Kubernetes Vaultsop vault list
Inspect “AWI CI accounts”op vault get "AWS CI accounts"
Find capa-ami password itemop items list | grep capa-ami
Retrieve capi-ami one password itemop items get vatlttczb3iebcmf7t5hlartwq | grep -v password:
Share this link (good for 7 days)We could do this, but it’s only good for 7 days and then access to this is gone. I’d like to find a process to share this longer term. op items get vatlttczb3iebcmf7t5hlartwq --share-link |
@hh thank you I can confirm that i see it in my 1password |
@Ankitasw please DM me, we'll work out what you need (looks like you want to install and run a lambda at least!) |
The AWS account [email protected] / arn:aws:organizations::348685125169:account/o-kz4vlkihvy/819546954734 is probably where we want to create the iam roles. Probably similar to the way we create them at the top level Kubernetes AWS account. However I’m not sure how we want to manage the terraform for AWS org member-accounts, and the resources (like IAM users) that are needed by them. Should the CAPA team create their own terraform to create acccounts there? I can’t imagine scaling this if we have to manage all-the-k8s sub/member-acccounts with terraform in the same repo managed by the same team. Suggestions welcome. If we decide to go with top level accounts, and a good read might be Accessing member accounts in your organization, however I would still recommend we find a way to delegate or help setup a separate way to manage the AWS K8s organization member-account terraform. Our top level [email protected] account + orgaws organizations describe-organization {
"Organization": {
"Id": "o-kz4vlkihvy",
"Arn": "arn:aws:organizations::348685125169:organization/o-kz4vlkihvy",
"FeatureSet": "ALL",
"MasterAccountArn": "arn:aws:organizations::348685125169:account/o-kz4vlkihvy/348685125169",
"MasterAccountId": "348685125169",
"MasterAccountEmail": "[email protected]",
"AvailablePolicyTypes": [
{
"Type": "SERVICE_CONTROL_POLICY",
"Status": "ENABLED"
}
]
}
} List of current top level IAM Usersaws iam list-users --output=table --query 'Users[*].[UserName,Arn]'
Inspect [email protected] accountaws organizations describe-account --account-id 819546954734
|
@hh (and @Ankitasw ) It would be good if there was a way for the maintainers of CAPA to manage the access to the accounts they use (the one for AMIs in this case). It would be more scalable as a general principal. I'd be happy maintaining terraform, or perhaps yaml for ACK for the CAPA specific account. |
The current list of maintainers of CAPA who will ideally need to be able to publish new AMIs are: (source) This changes over time so happy to contribute terraform or something else if needed. |
I think that the best path is to create terraform in infra/aws/terraform/cncf-k8s-infra-aws-capa-ami, where the Terraform provider for AWS is either expected to be run in the account or that it is accessing through assume role with the OrganizationAccountAccessRole for full-permissions. cc @hh |
Thanks @BobyMCbobs . I have started work on the terraform based on your suggestions and will have a PR for it soon. |
Finally got around to updating the PR for this. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
This is still needed: /remove-lifecycle stale |
We need to host all of the new CAPA AMIs going forward in a CNCF account such that it's maintained upstream.
Currently, the cost for running EC2 instances to generate AMIs is average of 5K USD in last 6 months. We also need small amount of budget for running a lambda function(costing around 20USD) and data transfer(costing around 36USD).
Would it be possible to provide a separate ACL to make this happen?
Refer slack thread here for more details.
The text was updated successfully, but these errors were encountered: