Open PeterGrace opened 4 years ago
i was able to use the thanos-operator
service account in the objectstore-bucket
and objectstore-compactor
deployments:
apiVersion: monitoring.banzaicloud.io/v1alpha1
kind: ObjectStore
metadata:
name: objectstore
spec:
config:
mountFrom:
secretKeyRef:
name: thanos
key: object-store.yaml
bucketWeb:
label: cluster
deploymentOverrides:
spec:
template:
spec:
serviceAccountName: {{ include "thanos-operator-stack.serviceAccountName" $ }}
{{- with index .Values "thanos-operator" "compact" }}
compactor:
deploymentOverrides:
spec:
template:
spec:
serviceAccountName: {{ include "thanos-operator-stack.serviceAccountName" $ }}
I can't figure out how to customize the storeendpoint-store
service account which blocks me from leveraging gcp workload identity.
Describe the bug Operated resources are created without a serviceAccount specified, causing the resources to use the
default
service account for the namespace. In many environments with restrictive pod security policies, service accounts are created with least privilege necessary to instantiate resources.Steps to reproduce the issue: Create any object-kind in thanos-operator that prompts the generation of a deployment, see that said resource is running in 'default' service account instead of the service account installed with the helm chart.
Expected behavior The thanos-operator would utilize the service account generated by the helm chart, or have the ability to specify the service account to be used when creating operated resources.
Screenshots
Additional context Utilizing helm-chart version 0.1.0 / operator version
banzaicloud/thanos-operator:0.1.0