Skip to content

Cloud Policies missing #220

Open
Open
@jeason81

Description

@jeason81

I am attempting to setup Kubescape Operator in an EKS environment but have been unsuccessful in determining what AWS permissions are required when specifying the cloudProviderMetadata.awsIamRoleArn section of the Helm chart. I found the documentation lacking for all Cloud Providers but was able to find this: https://hub.armosec.io/recipes/setup-aws-iam-authorization-of-in-cluster-installation-of-kubescape-in-eks. However, it appears this may be outdated as the Helm chart requires only a single ARN and the recipe creates two service accounts with their own policies. Additionally, the recipe specifies the --set createKubescapeServiceAccount=false parameter when doing the Helm install which does not exist in the current Helm chart.

Is it possible to get documentation on what is required for creating the AWS accounts/permissions needed for use with Kubescape Operator?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    Status

    Accepted

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions