A tool built for supporting AWS Secret Manager with Kubernetes. It has abilities to mutating Pods, unseal secrets and inject into application environment
Piggy is a tool built for supporting AWS Secret Manager with Kubernetes. It has abilities to mutating Pods, unseal secrets and inject into application environment.
Current release requires AWS IRSA to provide the IAM permission to piggy for unsealing secrets. Before installing Piggy webhooks, you must setup the IRSA on AWS. Sees [https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html] for complete detail of IRSA setting up. Alternatively, you can use Terraform the setup IRSA. Sees [https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/examples/irsa]
The simplest IRSA Policy for Piggy webhooks
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "PiggySecretReadOnly",
"Action": [
"secretsmanager:DescribeSecret",
"secretsmanager:GetResourcePolicy",
"secretsmanager:GetSecretValue",
"secretsmanager:ListSecretVersionIds",
"secretsmanager:ListSecrets"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Sid": "PiggyECRReadOnly",
"Action": [
"ecr:BatchCheckLayerAvailability",
"ecr:BatchGetImage",
"ecr:DescribeImages",
"ecr:GetAuthorizationToken",
"ecr:GetDownloadUrlForLayer"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
1) Run helm chart install
helm repo add piggysec https://piggysec.com
helm -n piggy-webhooks install piggy-webhooks piggysec/piggy-webhooks --set aws.roleArn=${piggy-role-arn}
2) Add these minimum annotations to your Deployment
apiVersion: v1
kind: Pod
metadata:
annotations:
piggysec.com/piggy-address: https://piggy-webhooks.piggy-webhooks.svc.cluster.local
piggysec.com/aws-secret-name: ${your-aws-secret-name} ## e.g. myapp/sample/production
piggysec.com/aws-region: ${your-aws-secret-region} ## e.g. ap-southeast-1
You can define a default AWS region by setting AWS_REGION
environment value in Piggy Webhooks
3) Add Env value with format piggy:${name}
containers:
env:
- name: TEST_ENV
value: piggy:TEST_ENV
4) That all!!. See the demo at [https://github.com/KongZ/piggy/tree/main/demo]
Some setting such as AWS region can set a default value by setting env
in piggy webhooks helm chart value.
Simply remove prefix piggysec.com
from annotation, put it all in upper case, and change -
to _
.
For example:
env:
AWS_REGION: "ap-southeast-1"
PIGGY_ENFORCE_SERVICE_ACCOUNT: "true"
This is a default mode. The Piggy Webhooks requires a permission to read secret from AWS Secret Manager.
The application containers will send request to Piggy Webhooks and Piggy Webhooks will inject the secret into containers environments
which prefix with piggy:
(1) ┌───────────┐ (10)
───▶ │ │ ───▶
───────│ Container │───────
│ │
└───────────┘
│
«tls»
│
││▲
(2)│││(9)
▼││
┌───────────┐ (3) ┌───────────┐ (5) ┌───────────┐
│Kubernetes │ ◀─── │ Piggy │ ───▶ │ │
│ API │────────│ Webhooks │────────│ AWS STS │
│ │ ───▶ │ │ ◀─── │ │
└───────────┘ (4) └───────────┘ (6) └───────────┘
│▲
│││(8)
(7)│││
▼│
┌───────────┐
│AWS Secret │
│ Manager │
│ │
└───────────┘
The example manifest file for Pod. To receive the Piggy Webhooks injection, you will need only 3 annotations
piggysec.com/piggy-address
- set a value to Piggy Webhooks servicepiggysec.com/aws-secret-name
- set a value to your AWS secret namepiggysec.com/aws-region
- set a value to your AWS secret manager regionapiVersion: v1
kind: Pod
metadata:
name: myapp
annotations:
piggysec.com/piggy-address: https://piggy-webhooks.piggy-webhooks.svc.cluster.local
piggysec.com/aws-secret-name: myapp/sample
piggysec.com/aws-region: ap-southeast-1
spec:
containers:
- image: myapp:v1
name: myapp
env:
- name: TEST_ENV
value: piggy:TEST_ENV
Then you can read the TEST_ENV
value from environment variable.
func main() {
val := os.Getenv("TEST_ENV")
fmt.Printf("%s", val)
}
Set piggy-enforce-integrity annotation to true
(default is true) will restrict piggy-env to resolve the variable only process defined on container arguments.
You may improve security by restrict only Pod service account to read the secrets.
You can limit access by adding variable name PIGGY_ALLOWED_SA
to AWS secret where value is namespace:service_account
name.
The Piggy Webhooks will not inject secrets into containers if the Pod service account name is not matched with value of PIGGY_ALLOWED_SA
.
You can add multiple service account name by separate each name with comma.
For example:
myapp-namespace:myapp,myanotherapp-namespace:default
The Piggy provides 3 concepts to protect secrets.
rails server
, you won’t be able to exec
into pod and run rails console
to get secrets. This option is enabled by default.You can set the secret name from annotation piggysec.com/aws-secret-name
but in proxy mode, you can remove this annotation.
The Piggy Webhooks will read secrets from default secret name which format is ${prefix}${namespace}/${service_account}${suffix}
For example, if you do not set prefix and suffix, the default secret name of Pods which service account name default
and namespace demo
is demo/default
You can optionally set prefix of default secret name by set ENV PIGGY_DEFAULT_SECRET_NAME_PREFIX
on Piggy Webhooks and suffix by set ENV PIGGY_DEFAULT_SECRET_NAME_SUFFIX
For example, if PIGGY_DEFAULT_SECRET_NAME_SUFFIX=/production
, the default secret name of sample above will be /demo/default/production
You can see examples at [https://github.com/KongZ/piggy/tree/main/demo]
You can set default AWS Region by set ENV AWS_REGION
on Piggy Webhooks. If AWS_REGION
is set on Piggy Webhooks, you do not need to set an annotation piggysec.com/aws-region
on Pod. In other word, the settings on Piggy Webhooks ENV can be overridden by pods annotations.
You can see examples at [https://github.com/KongZ/piggy/tree/main/demo]
The standalone mode will not use Piggy Webhooks to inject secrets into containers. It will requires Pod service account with IRSA to
read the secrets from AWS Secret Manager. You can enable standalone mode by adding annotation piggysec.com/standalone: "true"
to Pod
(1) ┌───────────┐ (6)
───▶ │ │ ───▶
───────│ Container │───────
│ │
└───────────┘
│ │
│ │
┌──────┘ └─────┐▲
││▲ │││(3)
(4)│││(5) (2)│││
▼││ ▼│
┌───────────┐ ┌───────────┐
│AWS Secret │ │ │
│ Manager │ │ AWS STS │
│ │ │ │
└───────────┘ └───────────┘
Since the standalone mode does not use Piggy Webhooks thus the Pod must have a permission to read secrets from AWS Secret Manager. You need to setup AWS IRSA with at least this permission
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "PiggySecretReadOnly",
"Action": [
"secretsmanager:DescribeSecret",
"secretsmanager:GetResourcePolicy",
"secretsmanager:GetSecretValue",
"secretsmanager:ListSecretVersionIds",
"secretsmanager:ListSecrets"
],
"Effect": "Allow",
"Resource": "${your-secret-name-arn}"
}
]
}
Then add then follow annotations to Pod. You may notice, you don’t have to provide the Piggy Webhooks address in this mode.
piggysec.com/aws-secret-name
- set a value to your AWS secret namepiggysec.com/aws-region
- set a value to your AWS secret manager regionpiggysec.com/standalone
- set a value to trueapiVersion: v1
kind: Pod
metadata:
name: myapp
annotations:
piggysec.com/aws-secret-name: omise-staging/sample/test
piggysec.com/aws-region: ap-southeast-1
piggysec.com/standalone: "true"
spec:
serviceAccount: myapp
containers:
- image: myapp:v1
name: myapp
volumeMounts:
- mountPath: /var/run/secrets/eks.amazonaws.com/serviceaccount
name: aws-iam-token
readOnly: true
env:
- name: TEST_ENV
value: piggy:TEST_ENV
- name: AWS_ROLE_ARN
value: ${your-role-arn}
- name: AWS_WEB_IDENTITY_TOKEN_FILE
value: /var/run/secrets/eks.amazonaws.com/serviceaccount/token
volumes:
- name: aws-iam-token
projected:
defaultMode: 420
sources:
- serviceAccountToken:
audience: sts.amazonaws.com
expirationSeconds: 86400
path: token
And the service account
apiVersion: v1
kind: ServiceAccount
metadata:
name: myapp
annotations:
eks.amazonaws.com/role-arn: ${your-role-arn}
Note: in standalone mode, piggy-env talks directly to AWS secret manager without talking to Kubernetes API or piggy-webhooks. The secrets is fully protected by AWS role permissions.
When application is deployed on Kubernetes, the Kubernetes API will send admission request to Piggy webhooks. The Piggy webhooks will mutate the pods and injecting secrets into containers
(1) ┌───────────┐ (2) ┌───────────┐ (5) ┌───────────┐ (6) ┌───────────┐
───▶ │ │ ───▶ │ Mutating │ ───▶ │ Object │ ───▶ │ │
───────│Create Pod │────────│ Admission │───────│Validation │───────│ Persisted │
│ │ │ │ │ │ │ │
└───────────┘ └───────────┘ └───────────┘ └───────────┘
│
«tls»
│▲
│││(4)
(3)│││
▼│
┌───────────┐
│ Piggy │
│ Webhooks │
│ │
└───────────┘
See how it works
See annotations
The piggy also support SSM Parameter Store. To retrieve secrets from parameter store, you will just add an annotation piggysec.com/aws-ssm-parameter-path
. The piggy automatically detect this annotation and pull the secrets from parameter store instead of secret manager.
Note: it support only GetParameterByPath so referencing AWS Secrets Manager secrets from Parameter Store parameters is not supported yet.
Annotations
The parameter store is reference in a hierarchy. The piggysec.com/aws-ssm-parameter-path
annotation will refer to parameter path and name will be a last value of path. For example:
The annotation is
piggysec.com/aws-ssm-parameter-path: /demo/sample/test
And the environment variable are
- name: TEST_ENV
value: piggy:TEST_ENV
- name: TEST_LIST
value: piggy:TEST_LIST
- name: TEST_PLAIN
value: piggy:TEST_PLAIN
Required ssm:GetParametersByPath
permission for reading parameter store.
Example minimum policy for reading value from SSM Parameter Store
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "PiggySSM",
"Effect": "Allow",
"Action": [
"ssm:GetParametersByPath"
],
"Resource": "*"
},
{
"Sid": "PiggyECRReadOnly",
"Action": [
"ecr:BatchCheckLayerAvailability",
"ecr:BatchGetImage",
"ecr:DescribeImages",
"ecr:GetAuthorizationToken",
"ecr:GetDownloadUrlForLayer"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
Licensed under the Apache License, Version 2.0 (the “License”); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0/
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.