Skip to content

Commit da31cc5

Browse files
Merge pull request #280404 from JnHs/jh-aks-0709
edits
2 parents 1118215 + 5cae3d0 commit da31cc5

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/aks/eks-edw-refactor.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For the data plane, the producer message body (payload) is JSON, and it doesn't
2525

2626
### AWS implementation
2727

28-
The AWS workload uses a resource-based policy that defines full access to an Amazon Simple Queue Service (SQS) resource:
28+
The AWS workload uses an IAM role policy that defines full access to an Amazon Simple Queue Service (SQS) resource:
2929

3030
```json
3131
{
@@ -40,7 +40,7 @@ The AWS workload uses a resource-based policy that defines full access to an Ama
4040
}
4141
```
4242

43-
The AWS workload uses a resource-based policy that defines full access to a DynamoDB resource:
43+
The AWS workload uses an IAM role policy that defines full access to an Amazon DynamoDB resource:
4444

4545
```json
4646
{
@@ -70,9 +70,9 @@ aws iam attach-role-policy --role-name keda-sample-iam-role --policy-arn=arn:aws
7070

7171
### Azure implementation
7272

73-
Let's explore how to perform similar AWS service-to-service logic within the Azure environment using AKS.
73+
Let's explore how to perform similar AWS service communication logic within the Azure environment using AKS.
7474

75-
You apply two Azure RBAC role definitions to control data plane access to the Azure Storage Queue and the Azure Storage Table. These roles are like the resource-based policies that AWS uses to control access to SQS and DynamoDB. Azure RBAC roles aren't bundled with the resource. Instead, you assign the roles to a service principal associated with a given resource.
75+
You apply two Azure RBAC role definitions to control data plane access to the Azure Storage Queue and the Azure Storage Table. These roles are like the IAM role policies that AWS uses to control access to SQS and DynamoDB. Azure RBAC roles aren't bundled with the resource. Instead, you assign the roles to a service principal associated with a given resource.
7676

7777
In the Azure implementation of the EDW workload, you assign the roles to a user-assigned managed identity linked to a workload identity in an AKS pod. The Azure Python SDKs for the Azure Storage Queue and Azure Storage Table automatically use the context of the security principal to access data in both resources.
7878

articles/aks/eks-edw-understand.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Azure implements [role-based access control (RBAC)][azure-rbac] differently than
2121

2222
## Authentication between services
2323

24-
The AWS EDW workload uses service-to-service authentication to connect with a queue and a database. AWS EKS uses `AssumeRole`, a feature of IAM, to acquire temporary security credentials to access AWS users, applications, or services. This implementation allows services to assume an IAM role that grants specific access, providing secure and limited permissions between services.
24+
The AWS EDW workload uses service communication to connect with a queue and a database. AWS EKS uses `AssumeRole`, a feature of IAM, to acquire temporary security credentials to access AWS users, applications, or services. This implementation allows services to assume an IAM role that grants specific access, providing secure and limited permissions between services.
2525

26-
For Amazon Simple Queue Service (SQS) and Amazon DynamoDB database access using service-to-service authentication, the AWS workflow uses `AssumeRole` with EKS, which is an implementation of Kubernetes [service account token volume projection][service-account-volume-projection]. In the EKS EDW workload, a configuration allows a Kubernetes service account to assume an AWS Identity and Access Management (IAM) role. Pods that are configured to use the service account can then access any AWS service that the role has permissions to access. In the EDW workload, two IAM policies are defined to grant permissions to access Amazon DynamoDB and Amazon SQS.
26+
For Amazon Simple Queue Service (SQS) and Amazon DynamoDB database access using service communication, the AWS workflow uses `AssumeRole` with EKS, which is an implementation of Kubernetes [service account token volume projection][service-account-volume-projection]. In the EKS EDW workload, a configuration allows a Kubernetes service account to assume an AWS Identity and Access Management (IAM) role. Pods that are configured to use the service account can then access any AWS service that the role has permissions to access. In the EDW workload, two IAM policies are defined to grant permissions to access Amazon DynamoDB and Amazon SQS.
2727

2828
With AKS, you can use [Microsoft Entra Managed Identity][entra-managed-id] with [Microsoft Entra Workload ID][entra-workload-id].
2929

0 commit comments

Comments
 (0)