title | platform |
---|---|
About the aws_eks_cluster Resource |
aws |
Use the aws_eks_cluster
InSpec audit resource to test properties of a single AWS Elastic Container Service for Kubernetes.
An aws_eks_cluster
resource block declares the tests for a single EKS Cluster by Cluster name.
describe aws_eks_cluster('my-eks') do
it { should exist }
end
describe aws_eks_cluster(cluster_name: 'my-eks') do
it { should exist }
end
This resource requires a single parameter, the EKS Cluster Name.
This can be passed either as a string or as a cluster_name: 'value'
key-value entry in a hash.
See also the AWS documentation on EKS Clusters.
Property | Description |
---|---|
arn | The Amazon Resource Name (ARN) of the cluster. |
name | The name of the cluster. |
endpoint | The endpoint for your Kubernetes API server. |
status | The current status of the cluster. |
version | The Kubernetes server version for the cluster. |
certificate_authority | The certificate-authority-data for your cluster. |
subnets_count | The number of subnets associated with your cluster. |
subnet_ids | The subnets associated with your cluster. |
security_groups_count | The count of security groups associated with your cluster. |
security_group_ids | The security groups associated with the cross-account elastic network interfaces that are used to allow communication between your worker nodes and the Kubernetes control plane. |
role_arn | The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf. |
vpc_id | The VPC associated with your cluster. |
created_at | The Unix epoch timestamp in seconds for when the cluster was created. |
creating | Boolean indicating whether or not the state of the cluster is CREATING. |
active | Boolean indicating whether or not the state of the cluster is ACTIVE. |
failed | Boolean indicating whether or not the state of the cluster is FAILED. |
deleting | Boolean indicating whether or not the state of the cluster is DELETING. |
tags | Cluster tags |
enabled_logging_types | Return list of enabled logging types. |
disabled_logging_types | Return list of disabled logging types. |
describe aws_eks_cluster('my-cluster') do
its('subnets_count') { should be > 1 }
end
describe aws_eks_cluster(cluster_name: 'my-eks') do
its('status') { should eq 'ACTIVE' }
end
describe aws_eks_cluster('my-cluster') do
its('vpc_id') { should eq 'vpc-12345678' }
end
describe aws_eks_cluster('my-cluster') do
its('role_arn') { should cmp 'rn:aws:iam::012345678910:role/eks-service-role-AWSServiceRoleForAmazonEKS-J7ONKE3BQ4PI' }
end
Use a combination of InSpec AWS resources to ensure your EKS Cluster does not use the Default VPC.
# Find the default Security Group for our VPC
cluster_vpc = aws_eks_cluster(cluster_name: 'my-cluster').vpc_id
default_sg = aws_security_group(group_name: 'default', vpc_id: cluster_vpc)
# Ensure we are not using the default Security Group
describe aws_eks_cluster(cluster_name: 'my-cluster') do
its('security_group_ids') { should_not include default_security_group.group_id }
end
This InSpec audit resource has no special matchers. For a full list of available matchers, please visit our Universal Matchers page.
The control will pass if the describe returns at least one result.
Use should_not
to test the entity should not exist.
describe aws_eks_cluster('AnExistingCluster') do
it { should exist }
end
describe aws_eks_cluster('ANonExistentCluster') do
it { should_not exist }
end
Your Principal will need the eks:DescribeCluster
action set to Allow.
You can find detailed documentation at Amazon EKS IAM Policies, Roles, and Permissions The documentation for EKS actions is at Policy Structure