-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm: Allow for iRSA #52
Comments
I'm not an AWS expert here, please, correct me if I'm wrong, and if I'm missing the context that should be about the following environment variables: kamaji-etcd/charts/kamaji-etcd/values.yaml Lines 100 to 103 in 0536a54
kamaji-etcd/charts/kamaji-etcd/values.yaml Lines 105 to 110 in 0536a54
If I understood correctly, we should make these ones optional to let the S3 client interact using the Kubernetes Service Account. |
Yes and also changing the conditionals around these to not be supplied: kamaji-etcd/charts/kamaji-etcd/templates/etcd_cronjob_backup.yaml Lines 76 to 89 in 0536a54
|
@jwitko @prometherion honestly, I would to move the backup script away from this chart and leave this duty to the datastore (human) operator as there are several ways to backup etcd in different environments. This issue is exactly the reason. Please note, this chart is not an etcd operator, so it should not mimic it. The etcd community is working to a new etcd operator and we'll switch to that once they done. Anyway, we can leave the backup script in this repo as simple tool (as the restore one) for basic usage, leaving more |
@kvaps for commenting |
I don't mind, but we already switched to using Currently it already implements the same functionality as this Helm chart, except periodic defragmentation and backups which can simple done using cronjobs. We're working on submitting this project to sig-etcd. This week we had a first meeting with SIGs, where we discovered features needed by the community to prepare the roadmap. |
closed by #70 |
The helm chart currently only allows for hard-coded environment variable based AWS IAM access key and secret key input. It does not allow for not-specifying these and letting iRSA handle it via the kubernetes service account.
The text was updated successfully, but these errors were encountered: