Uploaded image for project: 'OpenShift Logging'
  1. OpenShift Logging
  2. LOG-7687

Implement assume-role to enable cross-account forwarding

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Done
    • Icon: Normal Normal
    • Logging 6.4.0
    • None
    • Log Collection
    • None
    • Implement cloudwatch cross-account forwarding
    • Product / Portfolio Work
    • False
    • Hide

      None

      Show
      None
    • False
    • Green
    • NEW
    • Administer, API, Deploy, Release Notes
    • In Progress
    • NEW
    • 0% To Do, 33% In Progress, 67% Done
    • Hide
      This enhancement enables cross-account log forwarding for both CloudWatch and S3 outputs using AWS AssumeRole functionality. This feature allows centralized logging while maintaining security boundaries through a two-step authentication process, ensuring least privilege and promoting separation of concerns in the target account.
      Show
      This enhancement enables cross-account log forwarding for both CloudWatch and S3 outputs using AWS AssumeRole functionality. This feature allows centralized logging while maintaining security boundaries through a two-step authentication process, ensuring least privilege and promoting separation of concerns in the target account.
    • Enhancement
    • M

      Goals

      Expand the scope of work done by @amador in LOG-7505 to allow the assumeRole option for both types of cloudwatch authentication.

      Non-Goals

      This is not a complete refactor of aws auth

      Motivation

      Original effort restricted the cross-account forwarding to the `type: iamRole` of cloudwatch authentication.   Further efforts revealed the logic works the same for `type: awsAccessKey`.   This will ensure we continue to share common methods for cloudwatch auth going forward, and prepares the module for pending s3 integration (will use the same auth package).

      Alternatives

      Release as is with limited functionality

      Acceptance Criteria

      • Can assumeRole and forward to cross-account role with auth type: iamRole (OIDC auth with an sts-enabled cluster)
      • externalID field can be used with iamRole auth
      • Can assumeRole and forward to cross-account role or user, using long-lived credentials of type: awsAccessKey for initial auth (non-sts cluster)
      • externalID field can be used with awsAccessKey auth
      • New assumeRole field is validated for valid arn in the secret (both role or user)
      • Error exists in collector log if role/user permissions are not valid
      • Documentation includes both types and how to configure policies

      Risk and Assumptions

      Risk is additional testing and QE of this feature will expand, however the assumption is that with common methods, this can be reasonably testing without requiring an STS cluster.

      Documentation Considerations

      Initial doc created by Amador can be enhanced to include the expanded scope.    We will want to discuss this with the docs team to decide on official entry for docs.

      Additional Notes

              cahartma@redhat.com Casey Hartman
              cahartma@redhat.com Casey Hartman
              Anping Li Anping Li
              Brian Dooley Brian Dooley
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: