Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Service account is not propagated to Medusa standalone deployment #1294

Open
c3-clement opened this issue Apr 19, 2024 · 2 comments
Open

Service account is not propagated to Medusa standalone deployment #1294

c3-clement opened this issue Apr 19, 2024 · 2 comments
Labels
bug Something isn't working

Comments

@c3-clement
Copy link
Contributor

What happened?

The Medusa standalone deployment is using the default service account.

For AWS role based auth, that means that the default service account needs to be properly annotated and needs to be properly bound with the AWS IAM role.
Therefore, any pods created without a SA specified will be granted with AWS permissions.
This against the least privilege principle.

Did you expect to see something different?

I expect the Medusa standalone deployment's service account to be set to the value K8ssandraCluster.cassandra.serviceAccount .

How to reproduce it (as minimally and precisely as possible):

Create a k8ssandra cluster with medusa enabled and a non-default service account.

Environment

  • K8ssandra Operator version:
    1.15

  • Kubernetes version information:
    1.29

  • Kubernetes cluster kind:
    EKS

@c3-clement c3-clement added the bug Something isn't working label Apr 19, 2024
@adejanovski
Copy link
Contributor

We'll most probably remove the Medusa standalone pod altogether shortly as part of this issue.

@c3-clement
Copy link
Contributor Author

We'll most probably remove the Medusa standalone pod altogether shortly as part of this issue.

makes sense

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
Status: No status
Development

No branches or pull requests

2 participants