-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feat] Support workload identity in GCP #20
Comments
@anaik91 AFAIU, in the current configuration, we are using the From the perspective of helm, it is simply a config that we have to enable. Currently the The vars file might look something like this: create_service_account: true
gke:
workloadIdentity:
enabled: true
gsa:
connectAgent: <IAM SA for connectAgent>
runtime: <IAM SA for runtime>
synchronizer: <IAM SA for synchronizer>
... Each of the GSA keys correspond to the google service accounts for the corresponding components.
Let me know how you feel about this! |
@RiflerRick : Please do the following
|
Thanks |
Is your feature request related to a problem? Please describe.
Workload identity is supported by Apigee Hybrid, it is more secure and does not require key generation. (In some environments, service account key generation is not allowed by organization policy).
Describe the solution you'd like
when gcp.workloadIdentityEnable is set to true, no more check on serviceAccountRef during input check
Describe alternatives you've considered
No
Additional context
https://cloud.google.com/apigee/docs/hybrid/v1.10/install-configure-cluster.html#gke---workload-identity
The text was updated successfully, but these errors were encountered: