-
Notifications
You must be signed in to change notification settings - Fork 718
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[dev-v2.8] [rancher-logging] Backport PR #2646, logging account service annotation #3752
base: dev-v2.8
Are you sure you want to change the base?
[dev-v2.8] [rancher-logging] Backport PR #2646, logging account service annotation #3752
Conversation
Support for logging resource specific serviceaccount annotation, e.g. for AWS STS / IRSA Backport from dev-v2.9 rancher-logging 104.0.0-rc1+up4.4.0 Refs: rancher#2646
Validation steps
Ex:- longhorn-controller: repository: rancher/hardened-sriov-cni tag: v2.6.3-build20230913
|
@joshmeranda backport of the @kevinayres FYI |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello, we have improved the Charts documentation regarding Pull Request Rules.
Please take a look at it before making any new Pull Requests.
We are still approving Pull Requests and starting to inform all teams, soon we will require the standard in the documentation.
https://github.com/rancher/charts?tab=readme-ov-file#pull-request-rules
@nicholasSUSE thanks for approving, is anything else required from me to merge the PR? @joshmeranda I see you worked on the related PR, tagging you for feedback. |
Is anything blocking this merge? Can we have action please? Thanks |
@nicholasSUSE - error is "Error: The latest validation comment by github-actions[bot] does not have the required thumbs-up reaction!". Is there something you need from Dominic or can this be merged? It's been dormant a while now. Thank you. |
Issue:
Backport of #2646 for Rancher 2.8
Problem
To avoid usage of long-lived credentials or EC2 Instance Profiles and to narrow down the granted permissions, it's best practice for AWS customers to use IAM Roles for Service Accounts (IRSA). In
kube-logging
and the pluginfluent-plugin-cloudwatch-logs
this is in general supported but requires an appropriateserviceAccount
annotation in theLogging
resource. Every logging resource has it's own service account and therefore requires individual annotations.Adding them after deploying
rancher-logging
is possible but more complicated and has the risk to be changed or override with the next Helm run.Solution
Package patch version bumped based on https://github.com/rancher/charts/tree/dev-v2.9?tab=readme-ov-file#versioning-charts
I added a new value
loggingServiceAccountAnnotations
to add annotations based on the logging resource, usage:My use case is limited to Amazon EKS, therefore I only added logic for the
root
andeks
logging to use the values configured vialoggingServiceAccountAnnotations
. But for sure, this can be extended if required.Testing
Engineering Testing
Manual Testing
Done as part of #2646
Automated Testing
QA Testing Considerations
Regressions Considerations
Backporting considerations