-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove AWS keys from environment of containers #22
Comments
Tried to use roles to make this work: http://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html However,
I tried using the full ARN for the role, the ARN for the associated EC2 instance profile, and a bunch of other things, with no luck. Until someone can figure out what's going wrong, I'm reverting to environment variables. (We need to add CloudWatch permissions to the students.) We can probably live with this for now. However, anybody with "strong" AWS keys should not use those keys when doing |
Although this doc from above should've worked: http://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html it turns out it was the wrong instructions to follow. So I followed these instructions: http://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html and they worked as hoped. |
AWS keys are currently passed into the container environment so Limbo can talk to CloudWatch. These environments can be inspected with the ECS Web UI. A better approach would be to create an IAM Role for these containers with the right set of CloudWatch permissions.
The text was updated successfully, but these errors were encountered: