mirror of
https://github.com/davegallant/davegallant.github.io.git
synced 2025-10-06 09:26:02 +00:00
Compare commits
6 Commits
c5a749dbbf
...
11ab1b24a6
Author | SHA1 | Date | |
---|---|---|---|
|
11ab1b24a6 | ||
|
d839024d95 | ||
|
f9ee17986d | ||
|
953cf64989 | ||
|
c59415d6b3 | ||
|
f8d313309a |
92
content/blog/amazon-ebs-csi-driver-terraform/index.md
Normal file
92
content/blog/amazon-ebs-csi-driver-terraform/index.md
Normal file
@@ -0,0 +1,92 @@
|
|||||||
|
---
|
||||||
|
title: "Amazon EBS CSI driver with terraform"
|
||||||
|
date: "2024-04-07T15:20:23-04:00"
|
||||||
|
draft: false
|
||||||
|
comments: true
|
||||||
|
toc: false
|
||||||
|
author: "Dave Gallant"
|
||||||
|
tags: ['aws', 'eks', 'ebs', 'aws-ebs-csi-driver', 'oidc']
|
||||||
|
---
|
||||||
|
|
||||||
|
I recently configured the Amazon EBS CSI driver and found the setup with terraform to be more effort than expected. I wanted to avoid third-party modules and keep it as simple as possible, while remaining least privilege.
|
||||||
|
|
||||||
|
<!--more-->
|
||||||
|
|
||||||
|
The [Amazon EBS CSI driver docs](https://docs.aws.amazon.com/eks/latest/userguide/ebs-csi.html) mention that the following are needed:
|
||||||
|
- an existing EKS cluster
|
||||||
|
- IAM role (that allows communication to the EC2 API)
|
||||||
|
- EKS add-on (aws-ebs-csi-driver)
|
||||||
|
- OIDC provider
|
||||||
|
|
||||||
|
This sounded simple enough but I was unable to find a "grab-and-go" terraform example that followed the recommendations in the docs. I saw some suggestions about attaching an `AmazonEBSCSIDriverPolicy` policy to the node groups but did not think this was the best idea since this would allow many pods to potentially have access to the EC2 API.
|
||||||
|
|
||||||
|
After a few minutes of LLM prompting, I was unimpressed with the results. I began to piece together the config myself, and after some trial and error, this is the terraform that I came up with:
|
||||||
|
|
||||||
|
```hcl
|
||||||
|
|
||||||
|
# TLS needed for the thumbprint
|
||||||
|
provider "tls" {}
|
||||||
|
|
||||||
|
data "tls_certificate" "oidc" {
|
||||||
|
url = aws_eks_cluster.main.identity[0].oidc[0].issuer
|
||||||
|
}
|
||||||
|
|
||||||
|
# EKS addon
|
||||||
|
resource "aws_eks_addon" "ebs_csi_driver" {
|
||||||
|
cluster_name = aws_eks_cluster.main.name
|
||||||
|
addon_name = "aws-ebs-csi-driver"
|
||||||
|
addon_version = "v1.29.1-eksbuild.1"
|
||||||
|
service_account_role_arn = aws_iam_role.ebs_csi_driver.arn
|
||||||
|
}
|
||||||
|
|
||||||
|
# AWS Identity and Access Management (IAM) OpenID Connect (OIDC) provider
|
||||||
|
|
||||||
|
resource "aws_iam_openid_connect_provider" "eks" {
|
||||||
|
url = aws_eks_cluster.main.identity.0.oidc.0.issuer
|
||||||
|
client_id_list = ["sts.amazonaws.com"]
|
||||||
|
thumbprint_list = [data.tls_certificate.oidc.certificates[0].sha1_fingerprint]
|
||||||
|
}
|
||||||
|
|
||||||
|
# IAM
|
||||||
|
resource "aws_iam_role" "ebs_csi_driver" {
|
||||||
|
name = "${var.environment_name}-ebs-csi-driver"
|
||||||
|
assume_role_policy = data.aws_iam_policy_document.ebs_csi_driver_assume_role.json
|
||||||
|
}
|
||||||
|
|
||||||
|
data "aws_iam_policy_document" "ebs_csi_driver_assume_role" {
|
||||||
|
statement {
|
||||||
|
effect = "Allow"
|
||||||
|
|
||||||
|
principals {
|
||||||
|
type = "Federated"
|
||||||
|
identifiers = [aws_iam_openid_connect_provider.eks.arn]
|
||||||
|
}
|
||||||
|
|
||||||
|
actions = [
|
||||||
|
"sts:AssumeRoleWithWebIdentity",
|
||||||
|
]
|
||||||
|
|
||||||
|
condition {
|
||||||
|
test = "StringEquals"
|
||||||
|
variable = "${aws_iam_openid_connect_provider.eks.url}:aud"
|
||||||
|
values = ["sts.amazonaws.com"]
|
||||||
|
}
|
||||||
|
|
||||||
|
condition {
|
||||||
|
test = "StringEquals"
|
||||||
|
variable = "${aws_iam_openid_connect_provider.eks.url}:sub"
|
||||||
|
values = ["system:serviceaccount:kube-system:ebs-csi-controller-sa"]
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_iam_role_policy_attachment" "AmazonEBSCSIDriverPolicy" {
|
||||||
|
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy"
|
||||||
|
role = aws_iam_role.ebs_csi_driver.name
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The above configuration follows the docs, binding an IAM role to the service account _kube-system/ebs-csi-controller-sa_ using an OpenID connect provider.
|
||||||
|
|
||||||
|
After applying the changes above, I deployed [the sample application](https://docs.aws.amazon.com/eks/latest/userguide/ebs-sample-app.html) and noticed that the persistent volume claims were bound to EBS volumes.
|
@@ -12,6 +12,8 @@
|
|||||||
{{- $utterancesEnabled := $config.utterances.enable -}}
|
{{- $utterancesEnabled := $config.utterances.enable -}}
|
||||||
|
|
||||||
{{- if $utterancesEnabled -}}
|
{{- if $utterancesEnabled -}}
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
<section id='comments' class='comments'>
|
<section id='comments' class='comments'>
|
||||||
<div class='container sep-before'>
|
<div class='container sep-before'>
|
||||||
<div class='comments'>
|
<div class='comments'>
|
||||||
|
@@ -17,7 +17,7 @@
|
|||||||
--bg4: #32344a;
|
--bg4: #32344a;
|
||||||
--fg: var(--fg1);
|
--fg: var(--fg1);
|
||||||
--fg0: #ad8ee6;
|
--fg0: #ad8ee6;
|
||||||
--fg1: #acb0d0;
|
--fg1: #dddfeb;
|
||||||
--fg2: #7da6ff;
|
--fg2: #7da6ff;
|
||||||
--fg3: #9ece6a;
|
--fg3: #9ece6a;
|
||||||
--fg4: #32344a;
|
--fg4: #32344a;
|
||||||
|
@@ -28,32 +28,13 @@ function setCommentsTheme(theme) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function setTheme(theme) {
|
function setTheme(theme) {
|
||||||
if (theme == "auto") {
|
|
||||||
theme = window.matchMedia("(prefers-color-scheme: light)").matches
|
|
||||||
? "light"
|
|
||||||
: "dark";
|
|
||||||
}
|
|
||||||
document.documentElement.setAttribute("data-theme", theme);
|
document.documentElement.setAttribute("data-theme", theme);
|
||||||
setPrismTheme(theme);
|
setPrismTheme(theme);
|
||||||
setCommentsTheme(theme);
|
setCommentsTheme(theme);
|
||||||
}
|
}
|
||||||
|
|
||||||
function toggleTheme(e) {
|
|
||||||
const theme = e.currentTarget.classList.contains("light--hidden")
|
|
||||||
? "light"
|
|
||||||
: "dark";
|
|
||||||
setTheme(theme);
|
|
||||||
saveTheme(theme);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Initial load
|
setTheme("dark");
|
||||||
setTheme(getTheme());
|
|
||||||
|
|
||||||
window
|
|
||||||
.matchMedia("(prefers-color-scheme: dark)")
|
|
||||||
.addEventListener("change", (event) => {
|
|
||||||
setTheme(getTheme());
|
|
||||||
});
|
|
||||||
|
|
||||||
// This script is inlined in the <head> of the document, so we have to wait
|
// This script is inlined in the <head> of the document, so we have to wait
|
||||||
// for the DOM content before can add event listeners to the toggle buttons
|
// for the DOM content before can add event listeners to the toggle buttons
|
||||||
|
12
themes/hugo-theme-gruvbox/package-lock.json
generated
12
themes/hugo-theme-gruvbox/package-lock.json
generated
@@ -5952,9 +5952,9 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"node_modules/simple-icons": {
|
"node_modules/simple-icons": {
|
||||||
"version": "9.19.0",
|
"version": "9.21.0",
|
||||||
"resolved": "https://registry.npmjs.org/simple-icons/-/simple-icons-9.19.0.tgz",
|
"resolved": "https://registry.npmjs.org/simple-icons/-/simple-icons-9.21.0.tgz",
|
||||||
"integrity": "sha512-1qaJeBYKYzEcn1l7Jtm0BJMc96BGlnmpQvZMDsNiFDIJkJq6mCdPdH9oIGZUR86gfurJylgJ99R53DO6q/xwfQ==",
|
"integrity": "sha512-yxjs49nKwff5ozRwPCBVcGG4Ehlg5YiR1g4EJ83zmqc0hYhYb6UQJqiy2WOga2OJ1/qVHaej7q762hYZX/mavA==",
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": ">=0.12.18"
|
"node": ">=0.12.18"
|
||||||
},
|
},
|
||||||
@@ -10492,9 +10492,9 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"simple-icons": {
|
"simple-icons": {
|
||||||
"version": "9.19.0",
|
"version": "9.21.0",
|
||||||
"resolved": "https://registry.npmjs.org/simple-icons/-/simple-icons-9.19.0.tgz",
|
"resolved": "https://registry.npmjs.org/simple-icons/-/simple-icons-9.21.0.tgz",
|
||||||
"integrity": "sha512-1qaJeBYKYzEcn1l7Jtm0BJMc96BGlnmpQvZMDsNiFDIJkJq6mCdPdH9oIGZUR86gfurJylgJ99R53DO6q/xwfQ=="
|
"integrity": "sha512-yxjs49nKwff5ozRwPCBVcGG4Ehlg5YiR1g4EJ83zmqc0hYhYb6UQJqiy2WOga2OJ1/qVHaej7q762hYZX/mavA=="
|
||||||
},
|
},
|
||||||
"slash": {
|
"slash": {
|
||||||
"version": "5.1.0",
|
"version": "5.1.0",
|
||||||
|
Reference in New Issue
Block a user