Skip to content

Commit

Permalink
Allow controller to assume any role
Browse files Browse the repository at this point in the history
Drop kube2iam because this never was really working. Updated readme to
point to kiam.
  • Loading branch information
discordianfish committed Mar 14, 2018
1 parent 59a283b commit 2b51384
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 73 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,9 @@ the cluster is heathly.
We try to be reasonably secure, meaning all components are secured via TLS
and RBAC is enabled. Yet, due to the user-data size limits we need to fetch
the TLS keys from a S3 bucket. The permission for this is granted as an IAM
instance profile, that means you need to deploy kube2iam or something else
to block access to the metadata service. This isn't ideal but following the
current best practices.
instance profile, that means you need to deploy a metadata proxy to to block
access to the metadata service. This isn't ideal but following the current best
practices. We recommend [kiam](https://github.com/uswitch/kiam).

## Operations
You can either edit the Makefile or use environment variable to override
Expand Down
4 changes: 4 additions & 0 deletions kubernetes.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -752,6 +752,10 @@ Resources:
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- "sts:AssumeRole"
Resource: "*"
- Effect: Allow
Action:
- "ec2:Describe*"
Expand Down
70 changes: 0 additions & 70 deletions manifests/kube2iam.yaml

This file was deleted.

0 comments on commit 2b51384

Please sign in to comment.