Public Repository

Last pushed: a year ago
Short Description
Allow for AWS ECR credentials to be refreshed inside your Kubernetes cluster via ImagePullSecrets
Full Description

AWS ECR Credentials

Allow for AWS ECR credentials to be refreshed inside your Kubernetes cluster via ImagePullSecrets

How it works

  1. The tool runs as a pod in the kube-system namespace.
  • It gets credentials from AWS ECR via the aws-go sdk
  • Next it creates a secret named awsecr-creds (by default)
  • Then it sets up this secret to be used in the ImagePullSecrets for the default service account
  • Whenever a pod is created, this secret is attached to the pod
  • The container will refresh the credentials by default every 11 hours 55 minutes since they expire at 12 hours
  • Enabled for use with Minikube as an addon (https://github.com/kubernetes/minikube#add-ons)

NOTE: This will setup credentials across ALL namespaces!

How to setup running in AWS

  1. Clone the repo and navigate to directory

2a. If running on AWS EC2, make sure your EC2 instances have the following IAM permissions:

  {
   "Effect": "Allow",
    "Action": [
     "ecr:GetAuthorizationToken",
     "ecr:BatchCheckLayerAvailability",
     "ecr:GetDownloadUrlForLayer",
     "ecr:GetRepositoryPolicy",
     "ecr:DescribeRepositories",
     "ecr:ListImages",
     "ecr:BatchGetImage"
   ],
   "Resource": "*"
  }

2b. If you are not running in AWS Cloud, then you can still use this tool! Edit & create the sample secret and update values for AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS Account Id (base64 encoded)

echo -n "secret-key" | base64

kubectl create -f k8s/secret.yaml
  1. Create the replication controller. NOTE: If running on prem, no need to provide AWS_ACCESS_KEY_ID or AWS_SECRET_ACCESS_KEY since that will come from the EC2 instance.

    kubectl create -f k8s/replicationController.yml
    

DockerHub Image

About

Built by UPMC Enterprises in Pittsburgh, PA. http://enterprises.upmc.com/

Docker Pull Command
Owner
upmcenterprises