Best Way to Securely Provision IAM Roles for Talos Instances?

0
10
Asked By TechWhiz42 On

Hey everyone! I'm currently tackling a project where we have about 20 Kubernetes clusters, each tied to our retail locations and running on Talos. Each cluster is connected to its local network with internet access. The challenge we're facing is securely providing AWS credentials during the Talos bootstrap process (using YAML files) so that the clusters can pull images from ECR and access SSM secrets. We want to avoid static access keys, and are looking into IAM Roles Anywhere. This will require an X.509 client certificate, along with the usual parameters—ARN profile, role, trust anchor, and certificate paraphrase.

If anyone has dealt with a similar situation, I'd love to know how you managed this. What's the best and most secure way to provision the necessary certificates or credentials to each Talos instance or cluster? We've also considered OIDC for authentication, but we currently lack it for machine-to-machine communications. Thanks for any insights!

3 Answers

Answered By CloudGuru99 On

Have you checked out AWS Roles Anywhere? It's a great alternative to static credentials. If you already have a CA infrastructure on-prem, like Hashicorp Vault, this could provide a pretty secure setup for your needs.

Answered By K8sNinja1 On

Consider using SSM to register your instances. This way, the instances can fetch role credentials easily. I’ve done this countless times on Flatcar, though I’m not exactly sure how it works on Talos. Just a heads up, there’s an extra cost involved for the Managed Instances that AWS charges for.

Answered By DevOpsFiend On

You might want to explore IoT Core with fleet provisioning by claim and Greengrass. It could provide a practical path for your situation.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.