Skip to content

Commit f96fa76

Browse files
benradstonegithub-actions[bot]Linus-SpectroCloud
authored
PCP-5305 - Additional requirements for EKS Pod Identity (#8725)
* docs: Additional requirements for EKS Pod Identity * docs: cross-account guidance for EKS Pod Identity * docs: architecture for EKS pod identity * docs: Apply suggestions from Vale * Optimised images with calibre/image-actions * docs: Apply suggestions from code review Co-authored-by: Linus Bourque <[email protected]> * docs: architecture source note * ci: auto-formatting prettier issues * chore: Trigger CI --------- Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: Linus Bourque <[email protected]>
1 parent 3ca30f8 commit f96fa76

File tree

9 files changed

+647
-76
lines changed

9 files changed

+647
-76
lines changed

Makefile

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,14 @@ format-images: ## Format images
326326
@echo "formatting images in /static/assets/docs/images/ folder"
327327
./scripts/compress-convert-images.sh
328328

329+
###@ Ensure webpconvert is installed
330+
331+
install-webpconvert:
332+
@command -v webpconvert >/dev/null 2>&1 || ( \
333+
echo "webpconvert not found — installing globally..."; \
334+
npm install -g webpconvert >/dev/null 2>&1 || (echo "Failed to install webpconvert" && exit 127) \
335+
)
336+
329337
###@ Find unused images assets
330338

331339
find-unused-images:

_partials/eks-pod-identity/_eks-pod-identity-enablement.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,15 @@ partial_name: eks-pod-identity-enablement
2121

2222
6. In Palette, paste the role ARN into the **ARN** field.
2323

24-
7. (Optional) To set a
24+
7. Click the **Validate** button to validate the credentials.
25+
26+
The **Add IAM Policies** option appears after successful validation. You can leave this blank for the purposes of EKS Pod Identity
27+
enablement, as the required IAM policies should have already been assigned to the IAM role created for Palette (for
28+
example, `SpectroCloudRole`).
29+
30+
9. (Optional) To set a
2531
[permission boundary](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html), click the
2632
**Add Permission Boundary** toggle and provide the ARN of a IAM policy or role in the **Permission Boundary ARN**
2733
field.
2834

29-
8. Click the **Validate** button to validate the credentials.
30-
31-
9. Click **Confirm** to create your AWS account.
35+
10. Click **Confirm** to create your AWS account.

_partials/eks-pod-identity/_eks-pod-identity-intro.mdx

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,5 @@ partial_category: eks-pod-identity
33
partial_name: eks-pod-identity-intro
44
---
55

6-
[EKS Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html) is a secure authentication
7-
mechanism that allows Kubernetes pods to assume IAM roles with temporary, automatically refreshed credentials. This
8-
eliminates the need for long-lived AWS credentials, addressing security concerns in highly regulated environments where
9-
organizations cannot use long-lived credentials.
10-
11-
:::info
12-
13-
This authentication method is only available for
14-
[self-hosted Palette](/enterprise-version/) or [Palette VerteX](/vertex/)
15-
instances deployed on Amazon EKS clusters.
16-
17-
:::
6+
Palette supports [EKS Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html), which allows
7+
pods to securely access AWS services using short-lived credentials. This is achieved by associating an IAM role with a Kubernetes service account, enabling pods that use that service account to assume the IAM role and access AWS resources without needing to manage long-lived AWS credentials.
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
partial_category: eks-pod-identity
3+
partial_name: eks-pod-identity-limitations
4+
---
5+
6+
- This authentication option is only available for [self-hosted Palette](/enterprise-version/) or [Palette VerteX](/vertex/) instances deployed on Amazon EKS clusters.
7+
8+
- Only Amazon EKS clusters can be deployed as workload clusters when using EKS Pod Identity for authentication.

0 commit comments

Comments
 (0)