We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What would you like to be added:
We have EKS Pod identity webhook that injects IAM credentials into pod running on EKSA cluster.
This allows granular per pod/deployment credentials configuration.
Considering EKSA is deployed on on-premise, we want to have IAM Roles anywhere credentials injector for pods.
Why is this needed:
For security purposes to get granular IAM credentials on pod level.
Workaround:
./aws_signing_helper credential-process \ --certificate /path/to/certificate.pem \ --private-key /path/to/private-key.pem \ --trust-anchor-arn <TA_ARN> \ --profile-arn <PROFILE_ARN> \ --role-arn <ExampleS3WriteRole_ARN>
Run above script as init container for application pod and store the credentials in a config file.
configure application to parse these credentails and authenticate with AWS cloud.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
What would you like to be added:
We have EKS Pod identity webhook that injects IAM credentials into pod running on EKSA cluster.
This allows granular per pod/deployment credentials configuration.
Considering EKSA is deployed on on-premise, we want to have IAM Roles anywhere credentials injector for pods.
Why is this needed:
For security purposes to get granular IAM credentials on pod level.
Workaround:
Run above script as init container for application pod and store the credentials in a config file.
configure application to parse these credentails and authenticate with AWS cloud.
The text was updated successfully, but these errors were encountered: