-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS OIDC Integration for VPN protected clusters #34610
Comments
Should be fixed by #38782 |
Users should be able to set up the AWS OIDC Integration even if their cluster is not public facing. |
@marcoandredinis I did this, but now when I try to enroll my EKS clusters, I am getting this error
Not sure what to do. |
When I wrote this comment we had another method for setting up the integration, which used S3 buckets. We decided to remove that method, and only provide the simpler one. I'll re-open the issue because it also means we can't use the Integration in clusters which are not publicly accessible. |
Are there any news on this issue? |
There's no updates on this. The best I can give is the docs version when we had this working. https://docs-ayi2ddc7g-goteleport.vercel.app/docs/management/guides/awsoidc-integration/ Please bear in mind that this is a temporary link and might disappear soon. |
What would you like Teleport to do?
Integrate with AWS when Teleport cluster is deployed without an Internet-public endpoint.
Eg, internal network protected by VPN
What problem does this solve?
Some deployments of Teleport are only accessible in an internal network.
In those cases, the AWS OIDC Integration is not completed because Amazon can't:
https://<proxy.example.com>/.well-known/openid-configuration
If a workaround exists, please include it.
The text was updated successfully, but these errors were encountered: