You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Currently we are storing our logging stack logs in s3 bucket. And we use s3 credentials to access s3 bucket. But considering using the s3 credential is insecure, we want to use IAM role with OIDC mechanism. As per the document, as of now it only supports with EC2 instance IAM role for EKS clusters. We also need support for service account annotation support at service account level.
Describe the solution you'd like
Support for IAM role service account annotation for non eks cluster
Describe alternatives you've considered
currently we are using sealedsecret controller to encrypt secret
Additional context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
Currently we are storing our logging stack logs in s3 bucket. And we use s3 credentials to access s3 bucket. But considering using the s3 credential is insecure, we want to use IAM role with OIDC mechanism. As per the document, as of now it only supports with EC2 instance IAM role for EKS clusters. We also need support for service account annotation support at service account level.
Describe the solution you'd like
Support for IAM role service account annotation for non eks cluster
Describe alternatives you've considered
currently we are using sealedsecret controller to encrypt secret
Additional context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: