We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Have a question? Please checkout our Slack Community or visit our Slack Archive.
Restricting access to the IMDS and Amazon EC2 instance profile credentials
There should be an option to disable IMDS for node groups
Amazon EKS security best practices https://docs.aws.amazon.com/eks/latest/userguide/best-practices-security.html
Managed nodes with a custom launch template Set the following settings in the launch template's Advanced details:
Metadata accessible – Enabled Metadata version – V2 only (token required) Metadata response hop limit – 1
None
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered:
Successfully merging a pull request may close this issue.
Have a question? Please checkout our Slack Community or visit our Slack Archive.
Describe the Feature
Restricting access to the IMDS and Amazon EC2 instance profile credentials
Expected Behavior
There should be an option to disable IMDS for node groups
Use Case
Amazon EKS security best practices
https://docs.aws.amazon.com/eks/latest/userguide/best-practices-security.html
Describe Ideal Solution
Managed nodes with a custom launch template
Set the following settings in the launch template's Advanced details:
Alternatives Considered
None
Additional Context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: