Closed kuzm1ch closed 2 years ago
on hold for now
Have you tried adding the annotation and leaving the provider.aws.role
blank?
From the error message above i see that the ESO pod already acquired credentials via kiam:
User: arn:aws:sts::****:assumed-role/****/kiam-kiam is not authorized to perform: sts:AssumeRole
If the role has the proper SSM/SM policy set everything should work i suppose.
After further investigation - ESO works fine with Kiam, but it needs some additional configuration. This is my resolution:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"sts:AssumeRole"
],
"Resource": [
"*"
]
}
]
}
spec:
template:
metadata:
annotations:
iam.amazonaws.com/role: arn:aws:iam::*****:role/<role-with-assume-permissions>
Thanks for documenting this!
Kiam is not working. AWS provider.
ESO is not able to assume role provided in SecretStore.spec.provider.aws.role. v0.3.10
Examples of the outcome
Observations (Constraints, Context, etc):
When I added Kiam annotation directly to the pod I received this error:
It will be good to have Kiam configuration part documented somewhere.