Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add new pattern for EKS cross account communication using VPC lattice #1953

Merged
merged 16 commits into from
Jul 31, 2024

Conversation

allamand
Copy link
Contributor

@allamand allamand commented May 28, 2024

Description

This PR introduce a new pattern that show case how to leverage VPC lattice for cross-cluster communication, in a secure manner relying on AWS Private CA and AWS Certificate Manager on a private Route 53 hosted zone.
The pattern demonstrate how to leverage EKS Pod Identity Session tags to do service level authorization with ABAC verifications.

Motivation and Context

  • This pattern was asked by Networking team.

How was this change tested?

  • Yes, I have tested the PR using my local account setup (Provide any test evidence report under Additional Notes)
  • Yes, I have updated the docs for this feature
  • Yes, I ran pre-commit run -a with this PR

Additional Notes

@allamand allamand requested a review from a team as a code owner May 28, 2024 16:51
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
spec:
containers:
- name: {{ .Release.Name }}-{{ .Values.version }}
image: public.ecr.aws/seb-demo/http-server:latest
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we use some public image like this instead?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not sure, the code to build the container is public : https://github.com/aws-samples/amazon-eks-security-immersion-day/blob/mainline/docker/http-server/launch_app.sh and I use a script to configure the CA at runtime

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I put the link to the Dockerfile used

allamand and others added 12 commits July 17, 2024 17:19
Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
…harts/demo/values.yaml

Co-authored-by: Apoorva Kulkarni <kuapoorv@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Signed-off-by: Sébastien Allamand <sallaman@amazon.com>
Copy link
Contributor

@askulkarni2 askulkarni2 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@askulkarni2 askulkarni2 merged commit c299452 into main Jul 31, 2024
5 checks passed
@askulkarni2 askulkarni2 deleted the vpc-lattice-pod-identity branch July 31, 2024 05:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants