-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AKS support in kuberentes #747
Comments
Hi Jeff in "gems/ood_core-0.18.1/lib/ood_core/job/adapters/kubernetes/batch.rb" we have
To get the credentials (given awscli is installed and ~/.aws folder exist: for Get the cluster name (assume one cluster available only). Get endpoint Get the certificate
|
Hi Jeff,
|
I'm not sure if I like bootstrapping users in ondemand itself. I'd prefer if the credentials were out of scope for us - that is, that they exist already in We're given the privilege to bootstrap a user to a kubernetes cluster - yes, but extending that privilege to create IAM users in AWS? I'll have to think on. In any case, if this works for you, then that's great! I'm not familiar with the pattern of using an auth confimap - is that common for AWS? |
The aws credentials for authentication only, users cannot trigger api call to aws using those credentials other than getting a token. that mean we can have a token out of those user credentials and populate the token to the user but since the code run in user space to. get and populate the token then a smart user can get the credentials. It is somehow complicated in AWS and my work based on AWS documentation. I guess it would be better if we can meet so I can explain my approach. Here is the docs of aws eks: https://docs.aws.amazon.com/eks/latest/userguide/cluster-auth.html
|
This ticket is to support AKS credential initialization in kuberentes.
┆Issue is synchronized with this Asana task by Unito
The text was updated successfully, but these errors were encountered: