Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow RDS connection using IAM Role #3215

Open
1 task done
shitikanth opened this issue Sep 26, 2024 · 0 comments
Open
1 task done

Allow RDS connection using IAM Role #3215

shitikanth opened this issue Sep 26, 2024 · 0 comments
Assignees
Labels
feature Feature request

Comments

@shitikanth
Copy link

Description

Currently PMM supports two ways of discovering RDS instances: through the Instance attached role and through static credentials.
.
There is no way to attach cross-account IAM policy directly to an instance role. The usual recommended method in AWS to access cross account resources is to create a cross-account role and give the resource (in this case the EC2 instance running PMM) permission to attach to that role.

Suggested solution

In addition to static IAM access key and secret credentials, PMM should offer the option of providing an IAM role arn and use STS to assume that role and allow adding RDS instances using those credentials.

Additional context

No response

Code of Conduct

  • I agree to follow this project's Code of Conduct
@shitikanth shitikanth added the feature Feature request label Sep 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Feature request
Projects
None yet
Development

No branches or pull requests

2 participants