-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
splunk smartstore not using pod role #627
Comments
Hi @dpachiappan , we are currently reviewing SmartStore connectivity(via splunkd) to S3 via AWS_WEB_IDENTITY_TOKEN_FILE(serviceaccount mapping to IAM role) token mounted on pod. Contrary to the suggestion on a different github issue, the Splunk Container is able to connect to S3(via aws-cli) commands when its mapped to a serviceaccount without running as root. Example standalone yaml running with default securityContext 41812(runAsUser & fsGroup)
The required env variables are added to the pod:
Note: serviceAccount splunk-operator-controller-manager is mapped to the IAM role akondur-s3-role which has permissions to S3 Read/Write/List operations Verifying S3 connectivity on container:
We are setting security context with fsGroup 41812 which allows access to the token. Read the issue here for reference. Read access provided for the mounted token via EKS:
|
I assume since this is through Splunkd, it would require changes to Core Splunk outside of the Splunk-operator. Is there anything we can do as a community to help speed this review along? Voting on a feature request? Talking to our partner Splunk reps? Glad to help where I can. |
Can't agree more with @satellite-no - I have the same issue and it's a big blocker for using SmartStore with EKS in a secure manner. As using the operator requires SmartStore, SmartStore requires AWS S3 and K8S clusters on AWS are usually running on EKS with IRSA - how are we supposed to set up a secure indexer cluster with the operator at all? In addition to the stuff written above: I can also access my S3 storage from my pod using the Python SDK from AWS (easier test case than using AWS CLI):
And here's the misleading error message that I got from Splunk accessing the storage:
|
Meanwhile, I think the operator project can update the SmartStore doc:
|
Please vote to add this to Splunk Enterprise |
subscribing. |
Subscribed, this effects me as well. Using AWS IRSA's are the standard now, this should be prioritized. |
@vivekr-splunk |
oh man! This looks like its might be out in Splunk 9.1.1 https://docs.splunk.com/Documentation/Splunk/9.1.1/Indexer/SmartStoresecuritystrategies |
Hello @dw-seanelliott , yes IRSA is supported in Splunk 9.0.5+ . there are few things we are still working on like private S3 bucket access which should be available in upcoming Splunk release. |
Hello @vivekr-splunk , Can you confirm that Smartstore configuration with Splunk-operator on EKS works now. We have been facing certain issues with the STS rsync() failures. Checking with AWS support they confirmed that they are not able to track any of the STS calls within the Cloudtrail logs. |
Hi,
Is there a way to configure splunk smartstore to authenticate via AWS_WEB_IDENTITY_TOKEN_FILE that is injected into the pod via service account mapping with IamRole?
Currently, the indexer is failing to upload the index data to S3 bucket as it is trying to use the instance role that doesn't have permissions.
The text was updated successfully, but these errors were encountered: