Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[v13] Support specifying assume_role_arn for Kube cluster matchers #28832

Merged
merged 1 commit into from Jul 10, 2023

Commits on Jul 7, 2023

  1. Support specifying assume_role_arn for Kube cluster matchers (#28282)

    * Support specifiying `assume_role_arn` for Kube cluster matchers
    
    This PR allows users to assume different AWS roles when interacting with
    AWS EKS API. It allows users to proxy EKS clusters in different AWS
    accounts using the same Teleport Kubernetes Service.
    
    Example configuration:
    
    ```yaml
    
    kubernetes_service:
      enabled: true
      resources:
      - labels:
          'a': 'b'
        aws:
          assume_role_arn: "arn:aws:iam::0987654321:role/KubeAccess"
          external_id: "0987654321"
      - labels:
          'c': 'd'
        aws:
          assume_role_arn: "arn:aws:iam::123456789012:role/KubeAccess"
          external_id: "123456789012"
    
    ```
    
    * reuse eks token validation
    tigrato committed Jul 7, 2023
    Configuration menu
    Copy the full SHA
    774bc1b View commit details
    Browse the repository at this point in the history