In this post I am going to describe how to maintain access to Amazon AWS EKS - kubernetes cluster with only attaching an IAM Role as an instance profile, without configuring access keys on the ec2 instance.
The benefit of course is not storing any Amazon IAM credentials on the ec2 instance. Having your infrastructure more secure.
In my use case, I wanted to have my Jenkins CI server have access to EKS cluster for adding continuance delivery using Jenkins declarative pipeline, to my continuance integration process. By doing that achieving full CI\CD process for all the microservices that Jenkins handled.
The entire process will be done using the awscli, but of course, can be done in the AWS Console.
Creating IAM Role for EC2 Instance
- Create a file that will have the trust policy for EC2, this will allow the role to be attached to any ec2 instance.
cat >> assume-policy.json <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": { "Service": "ec2.amazonaws.com"},
"Action": "sts:AssumeRole"
}
]
}
EOF
*Create the role
aws iam create-role --role-name full-eks-access-role \
--description "Accessing all of account EKS cluster API endpoints" \
--assume-role-policy-document file://./assume-policy.json
Make sure the keep the Arn in the once the result return from command, we will use it to configure the access in kubernetes.
Creating IAM Policy for EKS full access to attach IAM role that we’ve create
*Create a policy file for accessing EKS
This is a full access to any EKS cluster in the account, but can be more strict if you like.
cat >> eks-full.json <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"eks:*"
],
"Resource": "*"
}
]
}
EOF
*Create the policy using the eks-full.json we created
aws iam create-policy --policy-name eks-full-access \
--description "EKS Full access policy" \
--policy-document file://./eks-full.json
Make sure to have the ARN created
*Attach the policy to the IAM Role created
aws iam attach-role-policy --role-name full-eks-access-role \
--policy-arn arn:aws:iam::00000000000:policy/eks-full-access
Don’t copy and paste exactly the command from here, copy it from the command prompt, the policy and roles will have your aws account number
Create the EC2 Instance profile with the role we have created
*Create an Instance profile
aws iam create-instance-profile --instance-profile-name Jenkins
*Add the role we created to the ec2 instance profile
aws iam add-role-to-instance-profile --role-name full-eks-access-role --instance-profile-name Jenkins
*Attached the IAM Role to the ec2 instance that needs access to the EKS
aws ec2 associate-iam-instance-profile \
--instance-id i-09eef2945b7c4c39e \
--iam-instance-profile Name=Jenkins \
--region eu-west-2
Configure aws-auth access with the IAM role
If you have an EKS cluster, you probably familiar with aws-auth.yaml file for managing cluster authentication. This yaml file contains the ec2 nodes and iam users that are allowed to access the kubernetes api server.
To simplify:
It means that every kubectl
command passes its AWS identity that was used with the command to the cluster, it first validate that the identity has access to it (this is the Role we have created), than it check the identity in cluster RBAC using the aws-auth file.
*Retrieve and edit aws-auth file
Amazon has well documented explanation about the files and retrieving it from their storage. Download the file or edit your existing one, that probably holds the role of the EKS nodes that you configured in the past. (it must have the eks nodes role for joining the cluster)
If you have this configMap applied to the cluster, edit the existing one without deleting anything in it. this might cause a lockout except the original identity that have created the cluster.
If you didn’t configured it yet (new cluster) download and edit the file
curl -o aws-auth-cm.yaml https://amazon-eks.s3-us-west-2.amazonaws.com/cloudformation/2019-02-11/aws-auth-cm.yaml
Edit the file with the role created
apiVersion: v1
kind: ConfigMap
metadata:
name: aws-auth
namespace: kube-system
data:
mapRoles: |
- rolearn: <ARN of instance role (not instance profile)>
username: system:node:{{EC2PrivateDNSName}}
groups:
- system:bootstrappers
- system:nodes
- rolearn: arn:aws:iam::00000000000:role/full-eks-access-role
username: jenkins
groups:
- system:masters
Apply the file from your station kubectl apply -f ./aws-auth-cm.yaml
Configuring the ec2 instance
Now that we have a role setup and the instance profile is attached to the ec2, connect to the ec2 instance.
Install the following: pip, awscli, kubectl and aws-iam-authenticator
# pip
curl https://bootstrap.pypa.io/get-pip.py | sudo python3
# awscli
sudo pip install --upgrade awscli
# kubectl - with an install script I made
curl https://raw.githubusercontent.com/omerh/scripts/master/upgrade_kubectl.sh | sudo bash
# aws-iam-authenticator
curl -o aws-iam-authenticator https://amazon-eks.s3-us-west-2.amazonaws.com/1.12.7/2019-03-27/bin/linux/amd64/aws-iam-authenticator
chmod +x ./aws-iam-authenticator
sudo mv ./aws-iam-authenticator /usr/local/bin/
Create kube config using awscli and verify access
aws eks --region <your region> update-kubeconfig --name <eks cluster name>
Now that all is set, lets check access to the eks cluster
kubectl get node
Your done!
I hope that this post was helpful, feel free to comment, ask and of course, share :)