-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Karpenter-AddOn] Remove AmazonEKS_CNI_Policy if VPC-CNI AddOn enabled with serviceAccountPolicies defined #859
Comments
@youngjeong46 please take a look. Since we are hardcoding the policies for the node role in the Karpenter addon, let's 1/ create a mechanism to override the behavior with custom policies and 2/ consider adding a flag to exclude CNI policy. We should not make the Karpenter addon dependent on the VPC CNI but we can make it configurable to satisfy the customer use case. |
This issue has been automatically marked as stale because it has been open 60 days |
@shapirov103 @vumdao A couple comments here:
|
Seems reasonable to go with approach 1/ and see what customer experience if the use case is to just exclude a specific policy. For pipeline build policies for example, I used DEFAULT BUILD policies here https://github.com/aws-quickstart/cdk-eks-blueprints/blob/main/lib/pipelines/code-pipeline.ts#L200 There can be several sets of policies defined that customers can pick and choose. Option 2 could be just a boolean flag, e.g. addCniPolicy (true by default). that makes it explicit. This option would make sense if that turns out to be the most common use case for the customer. Let's hear the customer voice. |
This issue has been automatically marked as stale because it has been open 60 days |
Issue closed due to inactivity. |
Describe the feature
In order for the Amazon VPC CNI to manage IP addresses, it requires AWS Identity and Access Management (AWS IAM) permissions. Amazon EKS recommends creating a separate AWS IAM role with the permissions defined in AmazonEKS_CNI_Policy managed policy then associate that role with the VPC CNI using IRSA (i.e., AWS IAM roles for service account).
When specified, the node role for the cluster provider can be configured without the CNI policy (Ref: https://github.com/aws-quickstart/cdk-eks-blueprints/blob/main/lib/addons/vpc-cni/index.ts#L268). This help the node role more least privilege
Use Case
My addons
Proposed Solution
No response
Other Information
No response
Acknowledgements
CDK version used
2.101.1
EKS Blueprints Version
1.12.0
Node.js Version
v20.8.1
Environment details (OS name and version, etc.)
macOS Sonoma 14.0
The text was updated successfully, but these errors were encountered: