Skip to content

k8s Role setup + Helm #29

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
fhennig opened this issue Mar 24, 2022 · 2 comments
Closed

k8s Role setup + Helm #29

fhennig opened this issue Mar 24, 2022 · 2 comments
Assignees

Comments

@fhennig
Copy link
Contributor

fhennig commented Mar 24, 2022

We want an s3 section in the CRD, for now we can use the same structure as in druid:

s3:
  endpoint: s3-de-central.profitbricks.com
  credentialsSecret: s3-credentials

for the endpoint there is a configoption, the access key and secret key should be mounted from the referenced secret. The secret structure used in druid is:

apiVersion: v1
kind: Secret
metadata:
  name: s3-credentials
stringData:
  accessKeyId: YOURACCESSKEYIDHERE
  secretAccessKey: YOURSECRETACCESSKEYHERE

The secret should be mounted and the env vars for that are AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY. The secret also needs to be mounted in the executors, so they can read from S3 too; so the pod template needs to be adjusted accordingly.


Update:

We don't know in which namespaces the SparkApplications will be created, so we will need to create the ServiceAccount and RoleBinding on demand in the namespace of the SparkApplication. Our Kafka Operator is already creating service accounts, we can have a look there.

The role can be a ClusterRole, created in the Helm Chart.

@fhennig fhennig changed the title k8s Role setup k8s Role setup + Helm Mar 24, 2022
@fhennig fhennig self-assigned this Mar 28, 2022
@fhennig
Copy link
Contributor Author

fhennig commented Mar 29, 2022

@fhennig
Copy link
Contributor Author

fhennig commented Mar 29, 2022

I fixed it by setting the serviceaccount on our job pod

@bors bors bot closed this as completed in 984e5b2 Mar 31, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants