Skip to content

How to let trivy know to use AWS IAM credentials when pulling from IAM protected ECR repositories #264

Discussion options

You must be logged in to vote

@mmerrill3 I have an update on that after playing with AKS and ECR. It seems that it's a matter of configuration. You can try attaching the AmazonEC2ContainerRegistryReadOnly policy to the starboard (for Starboard CLI) or starboard-operator service account.

In the example below the nginx-private refers to the private image 119244888562.dkr.ecr.eu-central-1.amazonaws.com/library/nginx:1.16. After attaching the policy to the service account I was able to generate VulnerabilityReport.

kubectl get deployments.apps -o wide
NAME            READY   UP-TO-DATE   AVAILABLE   AGE   CONTAINERS   IMAGES                                                               SELECTOR
nginx-private   1/1     1  …

Replies: 9 comments 10 replies

Comment options

You must be logged in to vote
1 reply
@danielpacak
Comment options

Comment options

You must be logged in to vote
5 replies
@mmerrill3
Comment options

@danielpacak
Comment options

@mmerrill3
Comment options

@mmerrill3
Comment options

@edwardpius-watchguard
Comment options

Answer selected by mmerrill3
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@mmerrill3
Comment options

Comment options

You must be logged in to vote
1 reply
@danielpacak
Comment options

Comment options

You must be logged in to vote
2 replies
@giovannirco
Comment options

@giovannirco
Comment options

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
5 participants