Title: Create an easy way to set up new roles and serviceaccounts for user applications · Issue #69 · commitdev/zero-aws-eks-stack · GitHub
Open Graph Title: Create an easy way to set up new roles and serviceaccounts for user applications · Issue #69 · commitdev/zero-aws-eks-stack
X Title: Create an easy way to set up new roles and serviceaccounts for user applications · Issue #69 · commitdev/zero-aws-eks-stack
Description: Right now when someone wants to create a new application and give it access to something in AWS we give them instructions on how to do it using "IRSA", the new mechanism for granting access to pods, but there's still quite a bit of manua...
Open Graph Description: Right now when someone wants to create a new application and give it access to something in AWS we give them instructions on how to do it using "IRSA", the new mechanism for granting access to pods...
X Description: Right now when someone wants to create a new application and give it access to something in AWS we give them instructions on how to do it using "IRSA", the new mechanism for granting acce...
Opengraph URL: https://github.com/commitdev/zero-aws-eks-stack/issues/69
X: @github
Domain: github.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"Create an easy way to set up new roles and serviceaccounts for user applications","articleBody":"Right now when someone wants to create a new application and give it access to something in AWS we give them instructions on how to do it using \"IRSA\", the new mechanism for granting access to pods, but there's still quite a bit of manual work and confusion. I think we could simplify it by writing some terraform that would allow them to supply a list of service account names and corresponding AWS IAM policies, and we can create all the required resources. We can either just leave the list blank to start or maybe we could use it to create some of the service accounts we need for stuff we set up like `external-dns`.\n\nI imagine this could look like another file in `infrastructure/terraform/environments/\u003cenv\u003e/` maybe `application_iam_policy` where they can specify policy blocks like:\n```hcl\ndata \"aws_iam_policy_document\" \"my_application\" {\n statement {\n actions = [\n \"whatever\",\n ]\n\n resources = [\"*\"]\n }\n}\n```\n\nAnd then in `infrastructure/terraform/environments/\u003cenv\u003e/main.tf` in the vars we pass to `environment` we add a map of serviceaccount to policy like:\n\n```hcl\n application_iam_policies = {\n service_account = my_application\n namespace = app_namespace\n policy = aws_iam_policy_document.my_application\n }\n```\n\nThen in the background we create the role for them. We can do something similar in `infrastructure/kubernetes` and accept a list of serviceaccounts and namespaces and create the service accounts for them.","author":{"url":"https://github.com/bmonkman","@type":"Person","name":"bmonkman"},"datePublished":"2020-08-25T19:31:08.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":2},"url":"https://github.com/69/zero-aws-eks-stack/issues/69"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:fba31b75-3994-6d52-853e-7cd14bda01a0 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | E8E4:1CC7:1BAEF:23BCF:69819A5E |
| html-safe-nonce | 0a2cc297512a0da0a16f10187ad5a2af18f66f83889dc4a8358a61252a56fcc2 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFOEU0OjFDQzc6MUJBRUY6MjNCQ0Y6Njk4MTlBNUUiLCJ2aXNpdG9yX2lkIjoiOTU3OTczMzUzMTI4MzY4NzMzIiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0= |
| visitor-hmac | 8acb975cd471d8d962f0ae54f512c03a5595da5bec8ee0ddf060add7048f8fc8 |
| hovercard-subject-tag | issue:685733795 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/commitdev/zero-aws-eks-stack/69/issue_layout |
| twitter:image | https://opengraph.githubassets.com/9712f5666f60bf3231c647aeb5dc5fe3da6925bdf94669e459ecce4703bd4253/commitdev/zero-aws-eks-stack/issues/69 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/9712f5666f60bf3231c647aeb5dc5fe3da6925bdf94669e459ecce4703bd4253/commitdev/zero-aws-eks-stack/issues/69 |
| og:image:alt | Right now when someone wants to create a new application and give it access to something in AWS we give them instructions on how to do it using "IRSA", the new mechanism for granting access to pods... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | bmonkman |
| hostname | github.com |
| expected-hostname | github.com |
| None | e137814e266030874fd2c86863529d0622b13889eeda04148c57654b6ea84ad6 |
| turbo-cache-control | no-preview |
| go-import | github.com/commitdev/zero-aws-eks-stack git https://github.com/commitdev/zero-aws-eks-stack.git |
| octolytics-dimension-user_id | 44272088 |
| octolytics-dimension-user_login | commitdev |
| octolytics-dimension-repository_id | 247773730 |
| octolytics-dimension-repository_nwo | commitdev/zero-aws-eks-stack |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 247773730 |
| octolytics-dimension-repository_network_root_nwo | commitdev/zero-aws-eks-stack |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | dd58d68a7813bbec9c91422c8c35f4af33832d70 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width