You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Best practice for accessing Google APIs from workloads running in GKE cluster is to leverage Workload Identity Federation and link kubernetes service account with GCP service account with permissions to operate on Cloud products (such as pubsub).
Describe the solution you'd like
Documentation is available at the following link. While it should still be doable to grant permissions to GCP resources to k8s service account following this it would be great to support linking k8s service account via annotations as per the following snippet since there are limitations with IAM WIF principal described in this page.
Is your feature request related to a problem? Please describe.
Best practice for accessing Google APIs from workloads running in GKE cluster is to leverage Workload Identity Federation and link kubernetes service account with GCP service account with permissions to operate on Cloud products (such as pubsub).
Describe the solution you'd like
Documentation is available at the following link. While it should still be doable to grant permissions to GCP resources to k8s service account following this it would be great to support linking k8s service account via annotations as per the following snippet since there are limitations with IAM WIF principal described in this page.
I tried the following configuration on service-account.yml:
and updated values.yaml by adding the following section:
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
Additional context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: