-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Route53 API authorization in EC2 instances #27467
Comments
@justinsb assigning it you. I hope you can help us with this. But please feel free to reassign as necessary. |
Adding to 1.3 milestone |
Let's find another assignee. @quinton-hoole |
Justin has several things he is already working on for 1.3 and this seems like something someone else could tackle. |
Sorry this slipped off my plate We just need to add this to the IAM policy/policies
Question though - just on the masters, or on master & nodes? |
Thanks @justinsb. The Federation control plane pods run on nodes, so the answer to your question is "on nodes". |
More specifically it runs in pods on nodes. |
Federation needs this now (on the nodes), and I suspect ingress controllers will shortly want this also. Given we're going to authorize it on the nodes, we should authorize it on the master also (the master is much more trusted). Fix kubernetes#27467
Fix in #27794 . I did it on the master & on the nodes; I figure the nodes are the ones we are more concerned about security on, and not having it on the master is just going to cause confusion. |
Also, I just do it across the board, not just in federation. I know a lot of users are excited to have k8s auto-provision DNS with ingress (and get LetsEncrypt working)... |
Automatic merge from submit-queue AWS kube-up: Authorize route53 in the IAM policy Federation needs this now (on the nodes), and I suspect ingress controllers will shortly want this also. Given we're going to authorize it on the nodes, we should authorize it on the master also (the master is much more trusted). Fix #27467
Either verify that the EC2 VMs that are part of the cluster federation can access Route53 APIs or define the necessary IAM policies to allow these VMs to access Route53 APIs.
Equivalent authorization scopes were added to GCE and GKE in #27357 and #27466
cc @nikhiljindal @quinton-hoole @kubernetes/sig-cluster-federation
The text was updated successfully, but these errors were encountered: