The Teleport Discovery Service requires AWS IAM permissions to discover AWS
resources.
These permissions must be attached to an AWS IAM identity that the Discovery
Service instance can use.
Each section below describes the IAM permissions used to discover a specific
type of AWS resource.
Discover EKS clusters and fetch additional details about them.
EKSManageAccess
Automatically set up Teleport access for discovered EKS clusters.
You can use a list of ARNs and narrow the scope of the permissions to specific
regions or EKS clusters instead of using a wildcard.
The resource ARN has the following format:
The permissions in the EKSManageAccess statement are optional because the
Discovery Service will discover EKS clusters even when it cannot ensure that the
Teleport Kubernetes Service has access to the clusters it discovers.
If you omit any of the EKSManageAccess permissions, then it is your
responsibility to ensure that the Teleport Kubernetes Service can access each
EKS cluster.
Manual database registration?
To register a DynamoDB database with your Teleport cluster, you must
configure the database manually via static config or dynamic db resource.
Database discovery is not available for Keyspaces.
Details
Manual database registration?
To register a Keyspaces database with your Teleport cluster, you must
configure the database manually via static config or dynamic db resource.
When configured to discover RDS databases, the Teleport Discovery Service
will attempt to discover both RDS instances and Aurora clusters.
The rds:DescribeDBInstances permission is used to find RDS instances, but it
is also used to find additional information about discovered Aurora clusters, so
you should include this permission even if you only have Aurora clusters to
discover.
If you don't want Aurora cluster discovery, then you can omit the
rds:DescribeDBClusters permission.