-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependency on KIAM #3
Comments
You are right. Neither "kiam", nor "kube2iam" are needed anymore if using IAM roles for Service accounts in a AWS-managed Kubernetes/EKS environment. We are already using the new mechanism internally for our ALB Ingress Controller instances, but -- unfortunately -- without the help of this terraform module. I'll see if I can backport the configuration... |
I am about to push a new release of this module (v3.0.0). |
@headcr4sh can you include some documentation on how to set up an EKS cluster with OIDC enabled such that this module works? I am currently attempting to get this working via our own
and seeing that it returns If you have a way to get this working, some documentation would be much appreciated! |
@bensussman I created the same resources found here and it seemed to work for me. I did have to use a script to get the |
I tried for a week to get this to work, and ultimately went with a IAM User instead of a Role and passed the User Key/Secret into ALB Ingress Controller via env variables, and it worked. I am hoping to write up a full issue / stack overflow post with my minimal terraform code showing how it doesn't work, and if I can get it working write a blog post / documentation explaining it. I am specifically using the terraform AWS provider https://github.com/terraform-aws-modules/terraform-aws-eks and the |
I'm not using an EKS module, just the official AWS provider and the Kubernetes provider. I wonder if the issue is with the EKS module that you are using? |
My understanding of this system is that it depends on KIAM being set up correctly, such that the
alb-ingress-controller
deployment can give the following annotation:(seen here https://github.com/iplabs/terraform-kubernetes-alb-ingress-controller/blob/master/main.tf#L286).
However this project does not declare a dependency on KIAM. Is that a bug, or would you expect this to work out of the box for a terraform created EKS cluster?
In addition, it seems like EKS has a new mechanism for allowing pods to take on IAM roles https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html However my Terraform created EKS cluster does not have it enabled. Perhaps this project could be updated to use the new EKS OIDC mechanism for role assumption instead of KIAM, ideally with some instructions about how to create an EKS cluster with OIDC enabled such that it works with this package?
The text was updated successfully, but these errors were encountered: