-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Obsolete/Closed: Add config option to enable the encryption of AWS EKS secrets #2723
Conversation
…y ARN to encrypt EKS cluster secrets
…y ARN to encrypt EKS cluster secrets
…y ARN to encrypt EKS cluster secrets
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM but if this is merged we should open up a nebari-docs since it's a little tricky to implement and understand
I've confirmed that most of the mistakes you could make (wrong region, bad format, key doesn't exist or Nebari deploy user can't see it) will fail in the stage where it creates the IAM policy, so at least it won't get to modifying the EKS cluster before failing
I would say that we could have a validator in the AWS Pydantic provider (similar to how we already do for the instance types and region) so that the feedback loop in case of errors is quicker for the user doing the deployment (instead of relying on terraform only for the "check"). |
…rn to ensure KMS-key ARN available
…rn to ensure KMS-key ARN available
@viniciusdc @tylergraff |
…rn to ensure KMS-key ARN available
…rn to ensure KMS-key ARN available
…rn to ensure KMS-key ARN available
I think the issues with the tests below are due to the recent move from |
@viniciusdc, |
@viniciusdc @tylergraff @kenafoster |
Reference Issues or PRs
Fixes #2681
What does this implement/fix?
Put a
x
in the boxes that applyTesting
How to test this PR?
Any other comments?
Allows user to set EKS encryption of secrets by specifying a KMS key ARN in nebari-config.yaml
The KMS key must meet the following conditions: