Proposal Idea: ServiceAccount awareness of DataSources #2131
npapapietro
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Background
Most cloud providers have some sort of "workload identity" that allows a kubernetes ServiceAccount to be trusted to do operations in the cloud account. For example, AWS using IRSA (or pod identity) allows a service account to assume a role and do things in AWS.
So per
kind: Grafana
I can have that SA assume one role. If I want my Grafana to be able to read, lets say RDS, in a different account, I can chain cross account role assumptions. This is all good.Problem Statement
If I am limited by cross account permissions OR I have cross partition data sources (gov/china/commercial) I cannot implement cross account role assumption and role chaining is broken. I can run role assumption (using OIDC) from one sa to each partition. But I cannot make Grafana aware (I know I can use projected volumes to mount all SA below, but using the tokens is another story)
Possible Solution
The folks at https://fluxcd.io/ have implemented a solution to the above problem by defining a
serviceAccount
that can be attached to certain custom resources (example). This would likely be the favored implementation.Something like this:
Beta Was this translation helpful? Give feedback.
All reactions