Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Service account is not propagated to Medusa standalone deployment #1294

Open
c3-clement opened this issue Apr 19, 2024 · 4 comments
Open

Service account is not propagated to Medusa standalone deployment #1294

c3-clement opened this issue Apr 19, 2024 · 4 comments
Labels
bug Something isn't working

Comments

@c3-clement
Copy link
Contributor

c3-clement commented Apr 19, 2024

What happened?

The Medusa standalone deployment is using the default service account.

For AWS role based auth, that means that the default service account needs to be properly annotated and needs to be properly bound with the AWS IAM role.
Therefore, any pods created without a SA specified will be granted with AWS permissions.
This against the least privilege principle.

Did you expect to see something different?

I expect the Medusa standalone deployment's service account to be set to the value K8ssandraCluster.cassandra.serviceAccount .

How to reproduce it (as minimally and precisely as possible):

Create a k8ssandra cluster with medusa enabled and a non-default service account.

Environment

  • K8ssandra Operator version:
    1.15
  • Kubernetes version information:
    1.29
  • Kubernetes cluster kind:
    EKS

┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: K8OP-31

@c3-clement c3-clement added the bug Something isn't working label Apr 19, 2024
@adejanovski
Copy link
Contributor

We'll most probably remove the Medusa standalone pod altogether shortly as part of this issue.

@c3-clement
Copy link
Contributor Author

We'll most probably remove the Medusa standalone pod altogether shortly as part of this issue.

makes sense

@L1ghtman2k
Copy link

@adejanovski do you know what are the guidelines on removing medusa standalone pod after k8ssandra upgrade?

Would it be sufficient to cleanup just the deployment? (My expectation was for the operator to remove it, as part of an upgrade, but I can't seem to find docs suggesting that we should do the cleanup on our own)

@adejanovski
Copy link
Contributor

Yes, I dropped the ball when implementing its removal. Just delete the deployment and it won't get recreated.
Sorry about this

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
No open projects
Status: No status
Development

No branches or pull requests

3 participants