-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [request]: MapGroups in ConfigMap #150
Comments
+1 I was looking up documentation online for this same scenario, and happened to find this issue. Our engineers are put into groups for organizational purposes, it would be great to be able to leverage that organization in EKS. |
+1 |
Cross linking the issue on the authenticator - kubernetes-sigs/aws-iam-authenticator#176 Thanks for filing this. Technically the difficulty with this is IAM groups don't support the |
+1 This would be great way to organize our team's permissions. |
+1 |
I'm currently using https://github.com/ygrene/iam-eks-user-mapper as a workaround to this problem. It would be great if we could get this feature implemented. |
@wstewartii I was thinking to use this as well, but doesn't it kill the API call limit to aws? |
+1 |
{ {
|
nit: any chance someone can go in and format those json blobs? |
As a workaround, I've made a simple script for mapping IAM group members to RBAC group: |
@pmatv I'm getting a 404 |
@iamsudip I've corrected the URL, thanks |
So can we use mapGroups in the new release? |
I'd really love to see this. The workarounds with assumed roles are really not very satisfactory, for three reasons:
I recognize that the technical implementation of this might be more complicated than it is for users and roles, but I feel like this is something that needs to be addressed at some point by Amazon nonetheless. Workarounds and ad-hoc scripts just feel bad here. |
Hey! after a long research on this topic, we've decided to write a blog post covering this issue. |
+1 |
1 similar comment
+1 |
It seems like other AWS services are moving in the direction of using session tags for this purpose. But the IAM authenticator relies on the public STS API which does not expose session tags. |
Tell us about your request
In order to grant access to a group of users to an EKS cluster, I'd like to map a whole IAM group in the ConfigMap. Similar to "mapRoles" and "mapUsers", I'd like to use something like "mapGroups" and inform a group arn.
Which service(s) is this request for?
EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
In order to map a group of users to grant access to the EKS cluster, with current configMap specifications, the way to do it is to map each individual user by editing the configMap with "mapUsers".
Are you currently working around this issue?
The current workaround for this is to create a IAM policy that allows the group to assume a role that has access to the cluster and is mapped in the configMap. Then, assume the role before accessing the cluster with a command like: aws sts assume-role --role-arn arn:aws:iam::123456789:role/EKS-test-role --role-session-name
Additional context
Please let me know if this is a valid feature request. Maybe there's something here I'm missing, but I think it should be ok to map a IAM group arn to grant access to the EKS cluster.
The text was updated successfully, but these errors were encountered: