-
Notifications
You must be signed in to change notification settings - Fork 510
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide CloudWatch query to help customer identify clients sending re… #614
Conversation
…quests to global STS endpoint
content/security/docs/iam.md
Outdated
|
||
### CloudWatch query to help users identify clients sending requests to global STS endpoint | ||
|
||
Run CloudWatch query below to get ste endpoint. Run this If stsendpoint equals to "sts.amazonaws.com", then it is a global STS endpoint. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit ste
-> sts
…quests to global STS endpoint
content/security/docs/iam.md
Outdated
If you're migrating an application from another AWS compute service, such as EC2, to EKS with IRSA, this is a particularly important detail. On other compute services initializing an AWS SDK session does not call AWS STS unless you instruct it to. | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we add some wording around whats the recommendation, regional vs gloabl STS endpoint and place this part under this section Controlling Access to EKS Clusters
.
Also, seems like the command mentioned in this section Controlling Access to EKS Clusters
is missing the --region flag, we should update the sample command and the output from this command.
…quests to global STS endpoint
Hi we've migrated from markdown to asciidoc (official docs format for AWS). Please make the respective changes to the files in the folder: latest/bpg |
Provide CloudWatch query to help customer identify clients sending requests to global STS endpoint
Issue #, if available:
Description of changes:
Test on beta CO accounts. Got STS endpoint from authenticator logs:
time="2024-11-30T12:06:40Z" level=info msg="STS response" accesskeyid=ASIAABCDEFGGH accountid=123456789012 arn="arn:aws:sts::123456789012:assumed-role/AWSWesleyClusterManagerLambda-Add-AddonManagerRole-JOPQTE96H0BA/EKSClusterInsightsAuth" client="127.0.0.1:55380" method=POST path=/authenticate session=EKSClusterInsightsAuth stsendpoint=sts.us-west-2.amazonaws.com userid=AROACSJHFKKHJAHSJX
checkeded with global STS endpoint:
time="2024-12-06T11:46:59Z" level=info msg="STS response" accesskeyid=ASIAABCDEFGGH accountid=123456789012 arn="arn:aws:sts::123456789012:assumed-role/AmazonEKSClusterInsightsViewOnlyRole/EKSClusterInsightsAuth" client="127.0.0.1:60480" method=POST path=/authenticate session=EKSClusterInsightsAuth stsendpoint=sts.amazonaws.com userid=AROACSJHFKKHJAHSJX
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.