-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automate Getting Security Credentials from AWS_WEB_IDENTITY_TOKEN_FILE #4477
Comments
I struggle with similar issue on Vault-helm. I expected that the pod gets the IAM assigned. Is it a bug or the application needs to deal with the further authentication against AWS on its own? |
@shreyasmm Your AWS CLI is out of date. Please upgrade to @realrill As far as I am aware Vault, does not yet support IAM for Service Accounts |
@micahhausler If I understood correctly from your referred comment. |
@micahhausler thank you for pointing out need to install latest awscli version. i have tested it its working fine in latest release |
@shreyasmm Can this be closed out? |
@micahhausler yes sure |
/reopen This issue is happening again, exactly as described originally by @shreyasmm for CLI version 2, more specifically:
I just rolled back to version |
@micahhausler should I create a new issue or should this be reopen? thanks |
nevermind, the problem was that we were using a STS endpoint on our VPC and the security group was not added to it. It works on aws cli v1 because it doesn't use regional endpoints by default. This issue can stay closed. |
This feature request is related to EKS, which now supports IAM Roles for Service Accounts announced here.
When we assign a serviceAccount to a Pod or Deployment, In the pod environment we will have two environment variables
When we run
aws cli cannot directly create a session from AWS_WEB_IDENTITY_TOKEN_FILE environment variable automatically, Instead we need to run
set the environment variable so aws-cli can work
When we run aws cli
Can this whole process of creating a session from AWS_WEB_IDENTITY_TOKEN_FILE, getting credentials be automated in aws-cli could be helpful,
it finds diffcult to run the set of commands in each pods
Ref
https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/
https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html
aws/containers-roadmap#23
The text was updated successfully, but these errors were encountered: