Closed t83714 closed 1 year ago
In v1, when -enable_iam_login (or auto-iam-authn for v2) is on, cloud SQL proxy can connect to Cloud SQL without GCP service account credential (e.g. json key file).
-enable_iam_login
auto-iam-authn
See details here: https://cloud.google.com/sql/docs/postgres/connect-instance-kubernetes
However, we need to specify the k8s service account that runs the pod for this case.
The current helm template doesn't support it yet.
This ticket was about adding support of config the service account that run the cloud SQL proxy pods.
closed via PR: https://github.com/magda-io/magda/pull/3474
Allow to specify service account for cloud SQL pod
In v1, when
-enable_iam_login
(orauto-iam-authn
for v2) is on, cloud SQL proxy can connect to Cloud SQL without GCP service account credential (e.g. json key file).See details here: https://cloud.google.com/sql/docs/postgres/connect-instance-kubernetes
However, we need to specify the k8s service account that runs the pod for this case.
The current helm template doesn't support it yet.
This ticket was about adding support of config the service account that run the cloud SQL proxy pods.