Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide CloudWatch query to help customer identify clients sending re… #614

Closed

Conversation

tingrui-AWS-EKS-auth
Copy link

@tingrui-AWS-EKS-auth tingrui-AWS-EKS-auth commented Dec 4, 2024

Provide CloudWatch query to help customer identify clients sending requests to global STS endpoint

Issue #, if available:

Description of changes:

Test on beta CO accounts. Got STS endpoint from authenticator logs:

time="2024-11-30T12:06:40Z" level=info msg="STS response" accesskeyid=ASIAABCDEFGGH accountid=123456789012 arn="arn:aws:sts::123456789012:assumed-role/AWSWesleyClusterManagerLambda-Add-AddonManagerRole-JOPQTE96H0BA/EKSClusterInsightsAuth" client="127.0.0.1:55380" method=POST path=/authenticate session=EKSClusterInsightsAuth stsendpoint=sts.us-west-2.amazonaws.com userid=AROACSJHFKKHJAHSJX

checkeded with global STS endpoint:

time="2024-12-06T11:46:59Z" level=info msg="STS response" accesskeyid=ASIAABCDEFGGH accountid=123456789012 arn="arn:aws:sts::123456789012:assumed-role/AmazonEKSClusterInsightsViewOnlyRole/EKSClusterInsightsAuth" client="127.0.0.1:60480" method=POST path=/authenticate session=EKSClusterInsightsAuth stsendpoint=sts.amazonaws.com userid=AROACSJHFKKHJAHSJX

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@tingrui-AWS-EKS-auth tingrui-AWS-EKS-auth requested a review from a team as a code owner December 4, 2024 18:24

### CloudWatch query to help users identify clients sending requests to global STS endpoint

Run CloudWatch query below to get ste endpoint. Run this If stsendpoint equals to "sts.amazonaws.com", then it is a global STS endpoint.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit ste -> sts

kmala
kmala previously approved these changes Dec 16, 2024
If you're migrating an application from another AWS compute service, such as EC2, to EKS with IRSA, this is a particularly important detail. On other compute services initializing an AWS SDK session does not call AWS STS unless you instruct it to.


Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add some wording around whats the recommendation, regional vs gloabl STS endpoint and place this part under this section Controlling Access to EKS Clusters.

Also, seems like the command mentioned in this section Controlling Access to EKS Clusters is missing the --region flag, we should update the sample command and the output from this command.

@svennam92
Copy link
Collaborator

Hi we've migrated from markdown to asciidoc (official docs format for AWS). Please make the respective changes to the files in the folder: latest/bpg

@svennam92 svennam92 closed this Dec 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants