Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support EKS IAM authentication #117

Open
noyoshi opened this issue Dec 20, 2021 · 3 comments
Open

Support EKS IAM authentication #117

noyoshi opened this issue Dec 20, 2021 · 3 comments
Labels
enhancement New feature or request

Comments

@noyoshi
Copy link

noyoshi commented Dec 20, 2021

What problem are you facing?

EKS only supports IAM based authentication, unless you go a roundabout way and use an OIDC provider. This means that the helm provider is not able to interact with Crossplane created EKS clusters, since the kubeconfig that EKS uses depends on the aws cli or aws-iam-authenticator.

Some background on EKS auth: https://docs.aws.amazon.com/eks/latest/userguide/managing-auth.html

How could Crossplane help solve your problem?

Ideally, we would be able to use the helm provider targeting EKS clusters. My org is working on a Crossplane proof of concept and would like to demonstrate that we can use it to completely manage all the resources we create for customers, which includes both creating the clusters (creating an EKS cluster w/ the aws-provider) and then releasing our software to said clusters (with the helm-provider).

@noyoshi noyoshi added the enhancement New feature or request label Dec 20, 2021
@haarchri
Copy link
Member

from aws-provider perspective we create a connection-secret with a kubeconfig inside - you can use this connection-secret to interact with provider-helm to said clusters - is this not working for your use-case ?

@quanlk2511
Copy link

quanlk2511 commented Sep 9, 2024

Hi @haarchri , in our case, remote clusters are created outside of crossplane management (via terraform), we only want provider-helm to connect to the clusters and installed few initial charts (ex, argocd)
We dont really want to add the clusters under crossplane management totally.
Is it possible to have provider-helm support IRSA or PodIdentity and assumeRoleChain like provider-aws?
Thanks

@haarchri
Copy link
Member

haarchri commented Sep 9, 2024

Something we need to add

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants