-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get rid of eksctl produced cloud-user-sa
#3273
Comments
uwhacksweeks is removed already via #2173, I opened #3291 to finalize the cleanup. Related codeinfrastructure/eksctl/carbonplan.jsonnet Lines 70 to 82 in 682ef1f
Issue scope question@yuvipanda is the issue's scope narrowed specifically to replace how the permissions are granted? Currently carbonplan and openscapes has A wider scope could include:
I suggest we avoid the expanded issue scope of also reducing permissions - as it requires community engagement as well, possibly making us blocked. |
@consideRatio makes sense to just have it be 'remove |
@yuvipanda, by "replicate it in terraform", do you mean replicate the buckets in https://s3.console.aws.amazon.com/s3/buckets?region=us-east-1# for example (carbonplan) in the terraform config? If so, I understand that the the service account that we create via terraform will not have full access to the buckets like the old Do we wish to retain such access for the existing buckets to not introduce a breaking change? If so, should Also, @consideRatio said "arn:aws:iam::aws:policy/AmazonS3FullAccess which includes permission for them to create their own buckets etc." Do we wish to retain such permission in the future? Is this possible via our current terraform infra or do we need to tweak it to allow this. I am trying to understand how complicated it would be to could get rid of |
@GeorgianaElena yeah, we would have to communicate with the affected communities about it. Primary differences would be that they would not be able to create buckets, and there may be a change in how they can access buckets in other projects as well (am no sure). I don't think this should be resolved along with #3224, that is a big enough project by itself I think. |
Ok, makes sense! Thanks @yuvipanda! |
This can just simply be removed, as they are currently not using this functionality at all. |
I've updated this issue with action items left to do very specifically. |
Without this, 2i2c-org#3694 does not quite take, as the `user-sa` service account is not attached to the user pod. This unifies all our infrastructure so nobody is using service accounts created by `eksctl`. Since openscapes is *just about* to start using S3, this is a good time to make sure it's set up in a standard way. Fixes 2i2c-org#3273
Without this, 2i2c-org#3694 does not quite take, as the `user-sa` service account is not attached to the user pod. This unifies all our infrastructure so nobody is using service accounts created by `eksctl`. Since openscapes is *just about* to start using S3, this is a good time to make sure it's set up in a standard way. Fixes 2i2c-org#3273
The following three hubs use a
cloud-user-sa
service account provisioned by eksctl to give hub users full S3 access:This predates our more modern terraform based service accounts. We should get rid of these eksctl generated accounts and bring these hubs in line with the rest.
Action items
Stop using the
cloud-user-sa
service accountcloud-user-sa
serviceaccount by removingjupyterhub.singleuser.serviceAccountName
underconfig/clusters/openscapes/common.yaml
. Make a PR, get this deployed.$SCRATCH_BUCKET
S3 bucket, by runningaws s3 ls $SCRATCH_BUCKET
in a jupyterlab terminal in the hub. This should not error out.Remove the IAM service account from AWS
.jsonnet
file into a.yaml
file with thejsonnet
command in https://infrastructure.2i2c.org/hub-deployment-guide/new-cluster/aws/#create-and-render-an-eksctl-config-fileeksctl delete iamserviceaccount -f openscapes.eksctlyaml --name cloud-user-rsa
aws s3 ls $SCRATCH_BUCKET
still works inside a terminal in the jupyterhub.namespaces
variable ineksctl/openscapes.jsonnet
iam.serviceAccounts
in the main cluster definition ineksctl/opencsapes.jsonnet
Celebrate
This is a celebration of the fact that we've been serving openscapes so long that they're using deprecated features! When done, we can close this issue :)
The text was updated successfully, but these errors were encountered: