Skip to content

provide a script and all the needed resources to grant eks accesses to a AWS IAM

Notifications You must be signed in to change notification settings

doitintl/grant-eks-ro-access

Repository files navigation

Grant read-only access to a EKS cluster

The script automates all the steps needed to grant read-only access to a EKS. It also lets the to revoke the provided accesses.

How To

Requirements

Before executing the script you need to install:

  • jq
  • kubectl
  • eksctl
  • aws cli

You need to have admin permissions to the cluster. There requirements are tested by the script.

Grant read-only accesses:

./grant-ro-accesses.sh --grant <region> <clusterName> <arn>

Inputs to provide:

  • region: aws region where the cluster is
  • clusterName: eks cluster name
  • arn: IAM arn to provide accesses to

Example:

./grant-ro-accesses.sh --grant eu-west-1 cluster_name arn:aws:iam::123456789000:user/programmatic/eks_user

Revoke accesses:

./grant-ro-accesses.sh --revoke <region> <clusterName> <arn>

Inputs to provide:

  • region: aws region where the cluster is
  • clusterName: eks cluster name
  • arn: IAM arn to provide accesses to

Example:

./grant-ro-accesses.sh --revoke eu-west-1 cluster_name arn:aws:iam::123456789000:user/programmatic/eks_user

How does it work

This script leverage two EKS authentication methods providing permission to an AWS IAM entity:

  • ConfigMap aws-auth: today deprecated but used by the majority of current clusters
  • Access Entries: the recommended way

In both scenarios, a Cluster Role with read-only permissions is created and bound to a kubernetes group “doit-viewer”: the AWS IAM ARN will be added to this group, acquiring read-only permissions provided by the ClusterRole. Based on the cluster configuration, this last step is made with ConfigMap aws-auth or Access Entries.

Alt Text

Flow process of the script

Alt Text

Preserve aws-auth configmap history

In case the cluster is configured to use config map as authentication, before any update of the config map, its current status is backed up to the file aws-config_history.yaml

Features

The script:

  • provides the ability to grant and remove permissions
  • is robust: any prerequisite is tested
  • is idempotent: you can run it any time and have the same result (feature ongoing)

Kubernetes permissions

Kubernetes permissions are defined by the ClusterRole 'doit:view' defined in the file resources/k8s_objects.yaml. Currently this identical to the standard ClusterRole 'view' provided by kubernetes with the add of the last group of permissions letting to have read-only accesses to nodes.

About

provide a script and all the needed resources to grant eks accesses to a AWS IAM

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages