You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
awsRoleArn - and give to Keda operator assume role permissions (aws-kiam provider)
Configure awsAccessKeyId and awsSecretAccessKey
there is should be another way to authenticate with dedicated role to Keda operator without assume role permissions.
Use-Case
Granting minimum permissions without sts:AssumeRole permissions
for example if we want to work with AWS SQS scaler the role to operator should has this permission:
If we add this this would more a different type of authentication rather than Pod Identity Provider given the pod no longer has an identity but permissions are assigned on KEDA operator itself, no?
True, the implementation may need to contain another property in the ScaledObject resource under Triggers.Metadata to AWS scalers which tells to Keda operator use the permissions which assigned to him. Something like podIdentity if set false use permissions are assigned on KEDA operator itself, if true the behavior will remain as it is today. True is default.
currently anyone who working with ASW scaler has 2 different ways to authenticate to AWS:
https://github.com/kedacore/keda/blob/2de3a4c2e08ad76d8939357456588259f088c752/pkg/scalers/aws_iam_authorization.go
there is should be another way to authenticate with dedicated role to Keda operator without assume role permissions.
Use-Case
Granting minimum permissions without
sts:AssumeRole
permissionsfor example if we want to work with AWS SQS scaler the role to operator should has this permission:
Specification
The text was updated successfully, but these errors were encountered: