You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@datalab.apache.org by "Vira Vitanska (Jira)" <ji...@apache.org> on 2021/06/18 10:16:00 UTC
[jira] [Deleted] (DATALAB-701) Legion pods authentication with IAM
roles at GCP
[ https://issues.apache.org/jira/browse/DATALAB-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Vira Vitanska deleted DATALAB-701:
----------------------------------
> Legion pods authentication with IAM roles at GCP
> ------------------------------------------------
>
> Key: DATALAB-701
> URL: https://issues.apache.org/jira/browse/DATALAB-701
> Project: Apache DataLab
> Issue Type: Task
> Reporter: Vira Vitanska
> Assignee: Dmitriy Karbyshev
> Priority: Major
> Labels: 1.1.0, K8S_to_PaaS, feature
>
> As a Developer I would like to be able to authorize legion components such as fluentd with iam roles specific to the component so I don't have to setup predefined keys in configs.
> Details:
> We have kube2iam implementation at K8S cluster at AWS which provides AWS credentials to the PODs from EC2 Metadata. We need to implement the same feature at GKE cluster as well.
> As for now we grant access to fluentd, airflow and jenkins which store data at per cluster s3 bucket.
> The same approach should be transferred to GCP and automated with terraform.
> AC:
> * kube2iam analog for GCP is implemented with terraform
> * required IAM roles and policies are implemented with terraform
> * fluentd, legion models, jenkins, airflow can get access to GCS storage with IAM roles
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@datalab.apache.org
For additional commands, e-mail: dev-help@datalab.apache.org