-
Notifications
You must be signed in to change notification settings - Fork 270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create secret for service account if k8s version >= 1.24 #274
base: main
Are you sure you want to change the base?
Conversation
Hey @larrywax! I'm interested to learn more about your specific use case for needing a Secret-backed service account token, rather than letting Kubernetes use the TokenRequest API under the hood as described in the I think we'd want to avoid automatically creating this Secret by default for all K8s installations, so if you do need this Secret to be created, I'd probably want to see this being an opt-in setting, ie an installer could set some helm value to "turn on" the creation of this service account secret. I hope that makes sense! Let me know if you have any questions/clarifications |
Hey @pmossman! I think what you are saying makes total sense, I will update the PR to create the secret conditionally. Do you think something along the lines of
I need it because I'm trying to use IRSA to let airbyte use an S3 bucket as storage. It's not working, and my first guess was the missing service account secret. |
any updates on this one? thanks. |
@larrywax sorry for the slow reply here, I realized I misconfigured my Github mentions awhile back so I didn't see a notification that you had replied, my mistake! I know that we've had other open-source installers successfully use IRSA (see #263 for some context in case it's useful). Were you able to try this secret creation from your branch to verify that it fixes the issue? Either way I think this PR looks reasonable so I'll open it as an internal PR where I can run our full tests and merge if things check out. |
/create-oss-pr |
Unfortunately this PR doesn't seem to fix the issue
|
@larrywax sorry to hear that things still aren't working for you. If you'd like to share your helm configuration files (ie any values that you've set that differ from the repo defaults, or any custom helm value files that you're providing, with any sensitive info redacted), I could try to take a look and see if it looks like there are any missing configurations. We have an objective on our roadmap to stand up a dedicated, persistent AWS environment for end to end testing and reproduction of user issues so that we can provide better support for these types of investigations in the future. For now though, I think our best bet is to review your configurations and see if we can catch any issues there |
Hi @pmossman thanks again for your kind answer.
|
@larrywax @pmossman Following this issue since our team is also facing similar errors. I had a slight suspicion that IRSA logging from #263 works (since the underlying log4j module is using v1 client). On the other hand, since most of the S3 client Airbyte uses to fetch data is using the v2 SDK, should we also include I can open a PR similar to #263 with these changes if the above makes sense. ps. I hadn't had the time to setup a cluster to test this idea yet - feel free to validate if it's quicker on your end. |
larrywax seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account. You have signed the CLA already but the status is still pending? Let us recheck it. |
What
This PR adds the capability to create the service account secret, during helm install, if the kubernetes cluster version is >= 1.24
Since k8s v1.24 secrets API objects containing service account tokens are no longer auto-generated.
https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.24.md#urgent-upgrade-notes
How
Create a Secret API object linked to the service account if k8s version is >= 1.24.0
Can this PR be safely reverted / rolled back?
🚨 User Impact 🚨
If the user manually created the Secret object before this change, the helm install/upgrade command will fail.