Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

what permissions are required for ak/sk #150

Open
ipyker opened this issue Nov 27, 2024 · 4 comments
Open

what permissions are required for ak/sk #150

ipyker opened this issue Nov 27, 2024 · 4 comments
Labels
enhancement New feature or request question Further information is requested

Comments

@ipyker
Copy link

ipyker commented Nov 27, 2024

What RAM and ACK permissions should I grant to this ak/sk?

@jwcesign
Copy link
Contributor

Based on the code, it needs:

  • AutoProvisionGroup create permission
  • ECS delete permission
  • ContainerService DescribeClusterAttachScripts/DescribeKubernetesVersionMetadata permission
  • ECS Describe Instance types permission
  • ECS DescribeSecurityGroup/VSwitch permission

We will support limited permission configuration in the future

@jwcesign jwcesign added the question Further information is requested label Nov 27, 2024
@jwcesign
Copy link
Contributor

Related issue: #29

@ipyker
Copy link
Author

ipyker commented Nov 27, 2024

RRSA is the future direction, now AK/SK authorization needs to create a more granular policy permissions, so as to achieve the smallest granularity of security restrictions, I think the list of permissions you give can be subdivided, but at present I gave the following hosting permissions Karpenter can work normally.
AliyunCSFullAccess
ecs:AddTags
ecs:RemoveTags
ecs:Delete*
ecs:Create*
ecs:Describe*
vpc:Describe*

While it's still overprivileged, it may be necessary to provide the full Policy json as you would with reference AWS.
Reference: https://raw.githubusercontent.com/aws/karpenter-provider-aws/v1.0.7/website/content/en/preview/getting-started/getting-started-with-karpenter/cloudformation.yaml

@jwcesign
Copy link
Contributor

jwcesign commented Nov 28, 2024

Thanks for suggestion, a more granular policy permissions is a good approach.

Would you mind giving a PR about this? A doc to show the least permissions of AK/SK

@jwcesign jwcesign added the enhancement New feature or request label Nov 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants