Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upAllow using AWS Instance Metadata Service Version 2 (IMDSv2) in InstanceGroups #9970
Comments
|
I think this would be pretty straight forward to add. The main decision would be around the new API fields and their names. AWS, GCP, and Alibaba cloud use the term spec:
instanceMetadata:
httpPutResponseHopLimit: 1
httpTokens: requiredSome kops and k8s components require access to instance metadata, so I don't think we should support disabling it altogether but we could definitely support requiring IMDSv2 ( I think adding this would be pretty straight forward and roughly follow the docs we have.
I'm happy to provide more assistance if anyone wants to take this on |
|
Hi @rifelpet I would like to take this issue. Could you assign it to me? |
|
/assign @ivanlemeshev |
|
@ivanlemeshev do you need any assistance with this? Just checking in |


1. Describe IN DETAIL the feature/behavior/change you would like to see.
In AWS EC2 instances there is an Instance Metadata Service with Version 1 and Version 2
(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html).
You can enforce usage of IMDSv2 (=disallow v1) setting "HttpTokens" to "required". Or you can turn off IMDS by setting "HttpEndpoint" to "disable".
AWS Foundational Security Best Practices v1.0.0 requires usage of IMDSv2 only with a severity of HIGH (see remediation instructions: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-fsbp-controls.html#ec2-8-remediation)
For compliance and security reasons it should be possible to change this setting for an instancegroup (like "httpTokens: required" or something like that.