Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update iamserviceaccount for existing role #1785

Closed
omerlh opened this issue Feb 5, 2020 · 6 comments
Closed

Update iamserviceaccount for existing role #1785

omerlh opened this issue Feb 5, 2020 · 6 comments
Labels
kind/feature New feature or request stale

Comments

@omerlh
Copy link

omerlh commented Feb 5, 2020

Before creating a feature request, please search existing feature requests to see if you find a similar one. If there is a similar feature request please up-vote it and/or add your comments to it instead

Why do you want this feature?
Managing service accounts IAM credentials when having multiple cluster is challenging - the current approach is to create a new role for each cluster, and have a different annotation for each service in each cluster.

What feature/behavior/change do you want
eksctl update iamserviceaccount —role —cluster —service-account —namespace

The command will update the existing role with the cluster OIDC. So now, the process will be:

  • create a role and a policy
  • run this command for each production cluster
  • deploy the service account with the same annotation (same role) for all clusters

Next phase is GitOps support, which I guess should be simple - just need to add roleARN to the cluster definition under IAM section.

@omerlh omerlh added the kind/feature New feature or request label Feb 5, 2020
@vgribok
Copy link

vgribok commented Aug 14, 2020

+1 as this would be helpful for service accounts created by the ALB Ingress Controller Helm Chart.

@github-actions
Copy link
Contributor

This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label Jan 18, 2021
@michaelbeaumont
Copy link
Contributor

@aclevername Is this part of #3064 and #1497?

@aclevername
Copy link
Contributor

@aclevername Is this part of #3064 and #1497?

#1497 is mainly focused around roles in a single cluster. This issue appears to be slightly different, it seems to want to enable a single role for use in multiple clusters, which I think won't work currently as we add a condition to the role associating it to the clusters OIDC provider

@michaelbeaumont
Copy link
Contributor

@omerlh @vgribok WDYT? If I'm not mistaken, the role should have a trust policy that only permits one cluster to use it.

@github-actions
Copy link
Contributor

This issue was closed because it has been stalled for 5 days with no activity.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature or request stale
Projects
None yet
Development

No branches or pull requests

4 participants