Data Access Permissions

The data plane agent uses a K8s service account called rime-agent-model-tester for read access to the data and models you wish to use.

AWS EKS + S3

Our recommended authentication approach for this pattern is IAM roles for service accounts (IRSA).

  1. If not already configured for your cluster, be sure to create an IAM OpenID Connect (OIDC) provider for your cluster to use IAM roles for service accounts.

  2. Create a designated S3 bucket for your Robust Intelligence cluster. This will serve as the agent’s default data source.

  3. Create the following read access policy for the designated S3 bucket(s).

    {
      "Version": "2012-10-17",
      "Statement": [
          {
              "Effect": "Allow",
              "Action": [
                  "s3:ListBucket"
              ],
              "Resource": "arn:aws:s3:::<YOUR_BUCKET>"
          },
          {
              "Effect": "Allow",
              "Action": [
                  "s3:GetObject"
              ],
              "Resource": "arn:aws:s3:::<YOUR_BUCKET>/*"
          }
      ]
    }
    
  4. Create an IAM role that the rime-agent-model-tester K8s service account can assume, and associate it with the policy created in the previous step.

    • Save this ARN. You will need to specify this during the agent setup step.

  5. Create a trust relationship to allow the K8s service account to assume the IAM role.

GCP GKE + GCS

Our recommended authentication approach for this pattern is Workload Identity.

  1. Ensure that your GKE cluster has Workload Identity enabled.

  2. Create a designated GCS bucket for your Robust Intelligence cluster. This will serve as the agent’s default data source.

  3. Create an IAM service account and grant it role(s) that have storage.buckets.get and storage.objects.get permissions.

  4. Add IAM policy binding between the IAM service account and the K8s service account rime-agent-model-tester with role roles/iam.workloadIdentityUser.

Azure AKS + Blob Storage

Our recommended authentication approach for this pattern is Azure AD Workload Identity.

  1. Ensure that your AKS cluster has Workload Identity enabled.

  2. Create a designated blob container for your Robust Intelligence cluster. This will serve as the agent’s default data source.

  3. Create a managed identity and associate it with the blob container from the previous step.

  4. Create a role assignment to give your managed identity permissions to read from your blob storage container.

  5. Create a federated identity credential to associate the rime-agent-model-tester service account with your managed identity.

Other Cloud Providers

If you are using a different cloud provider or want to specify the service account directly, you can specify other configurations via the rimeAgent.modelTestJob.serviceAccount Helm values.

Your Solutions Architect can help you through this process.