Open hugoShaka opened 2 years ago
Possible approaches:
aws-iam-controller
at the beginning of the guide -> we might loose a lot of users hereaws-iam-controller
suggestionNote: we have similar scenarios with other cloud providers (azure and GCP) the default approach has been to rely on keys. It kinda makes sense for azure db discovery, there is an open issue to support and document workload identity for GKE.
If we're going to elevate the approach laid out in the EKS/Helm guide to be the one we recommend to get most users to production, we should make this issue one of our top priorities for the next quarter.
@alexfornuto @xinding33 I meant to tag you about the comment above but forgot
Update: in EKS, aws now runs the iam controller for us. This makes the setup a bit easier
Expected behavior:
Teleport, as a security product, should not advise users to grant Dynamo, S3 and Route53 read-write permissions to all workload running in the EKS cluster.
Current behavior:
Teleport on EKS guide advises user to do something that can be exploited if they run other workload in the cluster.
This is not only a documentation issue, there are important technical and UX considerations:
aws-iam-controller
and IAM for impersonation can be hard and complex (try to manually follow their docs without a strong Kubernetes and IAM experience)Technical context:
The only approach to do this more securely is to use an AWS Service Account. There are two common ways of using an AWS SA in Kubernetes:
aws-iam-controller
.The latter is the most secure way to do it, but adds up to 8 additional steps in the deployment guide.