You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@datalab.apache.org by "Vira Vitanska (Jira)" <ji...@apache.org> on 2021/06/18 10:16:00 UTC

[jira] [Deleted] (DATALAB-701) Legion pods authentication with IAM roles at GCP

     [ https://issues.apache.org/jira/browse/DATALAB-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Vira Vitanska deleted DATALAB-701:
----------------------------------


> Legion pods authentication with IAM roles at GCP
> ------------------------------------------------
>
>                 Key: DATALAB-701
>                 URL: https://issues.apache.org/jira/browse/DATALAB-701
>             Project: Apache DataLab
>          Issue Type: Task
>            Reporter: Vira Vitanska
>            Assignee: Dmitriy Karbyshev
>            Priority: Major
>              Labels: 1.1.0, K8S_to_PaaS, feature
>
> As a Developer I would like to be able to authorize legion components such as fluentd with iam roles specific to the component so I don't have to setup predefined keys in configs.
> Details:
> We have kube2iam implementation at K8S cluster at AWS which provides AWS credentials to the PODs from EC2 Metadata. We need to implement the same feature at GKE cluster as well.
> As for now we grant access to fluentd, airflow and jenkins which store data at per cluster s3 bucket.
> The same approach should be transferred to GCP and automated with terraform.
> AC:
>  * kube2iam analog for GCP is implemented with terraform
>  * required IAM roles and policies are implemented with terraform
>  * fluentd, legion models, jenkins, airflow can get access to GCS storage with IAM roles



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@datalab.apache.org
For additional commands, e-mail: dev-help@datalab.apache.org