-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using AWS signature for authentication #69
Comments
@dexter-mh-lee What sort of Kubernetes are you using? What process are you using to apply the policies to your IAM service accounts? |
We are using AWS EKS, and usually for our other use cases (Elasticsearch, MySQL, and so on), we can create a IAM service account with the permissions to access the AWS resources, and the AWS Signature v4 APIs run on each pod automatically picks up these policies (from the service account attached to the pod) and decides whether the pod has permissions to do certain actions. We couldn't find anything like this for Glue schema registry, so we had to give such permissions to the worker nodes of our EKS cluster directly, which is not ideal. |
@dexter-mh-lee Did you see these? https://docs.aws.amazon.com/glue/latest/dg/using-identity-based-policies.html#access-policy-examples-aws-managed (specifically the AWSGlueSchemaRegistryReadonlyAccess managed policy, which feels like a good fit for your use case) |
We are already using this. Problem is that I have to give such permission to our EKS worker nodes, meaning every single pod in the cluster has access to the schema registry. This is against the principles used by the rest of the AWS ecosystem. |
I apologize, I am not an expert in IAM - do you have a link to the process/documentation you are using for your other use cases where you are able to apply this at a pod level? I'm struggling to understand why you cannot apply this only to specifically labeled pods rather than the entire node. |
https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html
This is the usual way of attaching roles to pods.
…On Mon, Sep 20, 2021 at 1:07 PM Brian Likosar ***@***.***> wrote:
I apologize, I am not an expert in IAM - do you have a link to the
process/documentation you are using for your other use cases where you are
able to apply this at a pod level? I'm struggling to understand why you
cannot apply this only to specifically labeled pods rather than the entire
node.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#69 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAG2ZMI3PNDK4S45WKLUZTLUC5S4HANCNFSM5B76HLPA>
.
|
My humblest apologies for not responding sooner. I think it might be best for you to open a support case so we can investigate what is happening on the service side of both EKS and Glue Schema Registry to see if there isn't a solution. |
As suggested by Liko, you can get better help on this by reaching out to EKS AWS support team. Please let us know if there is something specific to GSR is not working. Closing this for now, please feel free to re-open or open a new issue if required. Thanks! |
Please don't close this. This has nothing to do with EKS. This is basic auth to access schema registry that is analogous with other AWS components. This hast to be implemented inside the schema registry. I don't understand what EKS team will do about this. |
Apologies for closing this. Looking at the documentation, are you facing issues creating IAM role with GSR policies in them? Or creating a service account. If you can share the replication steps for this problem, that would be very helpful. Please also consider opening a support case if you prefer to share information privately. |
FWIW: I've asked our dev-ops team to escalate this with AWS support and the EKS team, as this is a blocker for adopting EKS. |
@dexter-mh-lee Have you found the work around for this ? I am facing the similar issue |
I've the same issue. The serdes classes try to connect with the node user/ARN instead of the EKS service account role. |
This issue is may be probably caused by #120. Basically, the |
Hi.
I use IAM service accounts in k8s to give correct permissions to each pod talking to AWS systems. I could not find a documentation for how to do this for Glue schema registry. Is there a plan to add this functionality?
Currently, I need to add the permission to the worker node's IAM role, which is not ideal.
The text was updated successfully, but these errors were encountered: