-
Notifications
You must be signed in to change notification settings - Fork 979
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Restrict IAM permissions to those related to Karpenter managed resources #1332
Conversation
✅ Deploy Preview for karpenter-docs-prod ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
website/content/en/preview/getting-started-with-terraform/_index.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for making this change, this is awesome!
Before we merge this in, could you test this change using our development guide?
I'm trying to follow the guide but nearly all commands are failing similarly
|
website/content/en/preview/getting-started-with-terraform/_index.md
Outdated
Show resolved
Hide resolved
website/content/en/preview/getting-started-with-terraform/_index.md
Outdated
Show resolved
Hide resolved
Can you add #507 to the issue decription? |
ssm:GetParameter
IAM permissions to only the AWS service parameters
website/content/en/preview/getting-started-with-terraform/_index.md
Outdated
Show resolved
Hide resolved
controller-gen should be installed here w/ a We check on the next line if the go bin dir is in your path, maybe that check isn't working as intended? Can you check if the |
@bwagner5 / @ellistarn we just released a new sub-module which makes creating IRSA roles easier for common addons/controllers. That sub-module has the policy that I was updating here baked in - you can see it here. So now its just simply: module "karpenter_irsa" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
role_name = "karpenter_controller"
attach_karpenter_controller_policy = true
karpenter_controller_cluster_ids = [module.eks.cluster_id]
karpenter_controller_node_iam_role_arns = [
module.eks.eks_managed_node_groups["default"].iam_role_arn
]
oidc_providers = {
main = {
provider_arn = module.eks.oidc_provider_arn
namespace_service_accounts = ["karpenter:karpenter"]
}
}
} I have also updated our EKS docs to show this use case as well https://github.com/terraform-aws-modules/terraform-aws-eks#irsa-integration |
You need to add your $GOBIN to your $PATH for those binaries to be discovered. |
…rict-ssm-permissions
Hey @bryantbiggs . It looks like we are looking for these changes to be tested. Were you able to build and test these changes locally? (Also looks like we have some merge conflicts. Might be worth pulling down most recent commits and refreshing this PR). |
Updated to use the kubectl provider to deploy the Karpenter provisioner via Terraform. This removes the need for setting the cluster name environment variable. I have a working reference architecture for this here https://github.com/clowdhaus/eks-reference-architecture/tree/main/karpenter/us-east-1 which follows the community norm of simple |
Does that work when creating a new provisioner? In #1551 I had to add defaulted values to the provisioner spec:
Without this, creating a brand new provisioner using |
yes this works - here is a complete working example that mirrors the changes in this PR https://github.com/clowdhaus/eks-reference-architecture/tree/main/karpenter/us-east-1 |
This doesn't appear to be working for me, at least not on Terraform 1.1.7. From what I can tell the
|
Added in the required providers in order to properly resolve 3rd party providers |
This look good to me @bryantbiggs . I've tested the procedure and it works as expected. I've asked @chrisnegus to take a look as well, but we should be close to merging. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I made a small editing suggestion (not important), but otherwise it looks good from an editing standpoint. Because I have not tested it, someone else should okay the merge.
website/content/en/preview/getting-started/getting-started-with-terraform/_index.md
Outdated
Show resolved
Hide resolved
…h-terraform/_index.md Co-authored-by: Chris Negus <[email protected]>
Hey @bryantbiggs . Found one more issue here. It doesn't appear that the kube-config is updated automatically when following the instructions in this PR. Is there a way to have Terraform update the kube-config file automatically? |
Updated documentation to ensure users update their local kubeconfig before interacting with the cluster using kubectl in 8576324 |
I tested this locally and found it to work as expected. I'm going to go ahead and merge this change. |
1 similar comment
I tested this locally and found it to work as expected. I'm going to go ahead and merge this change. |
1. Issue, if available:
Relates to #507
Closes terraform-aws-modules/terraform-aws-iam#208
2. Description of changes:
ssm:GetParameter
IAM permissions to only the AWS service parameters where AMI IDs are stored/retrieved. This prevents the controller from having access to any parameters in the accounts its deployed within since SSM parameters do not support resource based policies. Its common for secrets or sensitive values to be stored in SSM so this ensures the controller role doesn't have access to those in the accounts its provisioned within. The policy is scoped based on the SSM GetParameter API calls identified here https://github.com/aws/karpenter/blob/ed9473a9863ca949b61b9846c8b9f33f35b86dbd/pkg/cloudprovider/aws/ami.go#L105-L123ec2:RunInstances
,ec2:TerminateInstances
, andec2:DeleteLaunchTemplate
API calls to only those resources that meet the condition where the tagec2:ResourceTag/karpenter.sh/discovery
= the cluster name. This limits the roles permissions to only run/terminate instances/launch templates that are tagged for Karpenter to controliam:PassRole
to only allow Karpenter to pass the associated node role, not any roleclusterName
andclusterEndpoint
need their values nested undercontroller
3. How was this change tested?
4. Does this change impact docs?
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.