-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Excessive calls to AssumeRoleWithWebIdentity w/ IRSA #997
Comments
@erhancagirici we have no cache enabled - we want to reopen this issue ? or create a new ? |
The fix in #1003 was a partial fix. We are still seeing significant calls to |
good to check crossplane-contrib/provider-aws#1148 |
@haarchri As a first step, the refactoring at #1204 will reduce the STS calls by 50%. I am working on a cache implementation and I've checked the crossplane-contrib/provider-aws#1148. I've been using a similar approach but there seems to be several things to consider with that and ongoing work, especially for some edge cases: Community provider implementation relies on caching the constructed default AWS config.
Some background info (on the implementation details): When we cache the config itself on top of that, we end up with a layered cache, i.e. we cache the underlying From this point on speaking for the all auth cases in a generic manner: However, the tricky part is handling potential changes in the AWS "config" at runtime, or more generally any "parameter" that would cause a different credential setup/ This means that we need to cache configs according to their content. Each set of config that results in a separate credential set, should have separate cache entries. The challenge here is:
From dev/maintainability POV, the above points imply:
With all said above, we will take a bit more time to carefully evaluate the options on how to move forward. I'll further update here. |
What happened?
Reduce the frequency of sts calls for AssumeRole/AssumeRoleWithWebIdentity by utilizing cached credentials. This will minimize the number of audit events in CloudTrail, and only renew the credentials when necessary, such as before expiration.
check implementation in community provider crossplane-contrib/provider-aws#828
How can we reproduce it?
What environment did it happen in?
The text was updated successfully, but these errors were encountered: