Skip to content

Conversation

@romsharon98
Copy link
Contributor

closes: #43464


^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named {pr_number}.significant.rst or {issue_number}.significant.rst, in newsfragments.

@potiuk
Copy link
Member

potiuk commented Nov 19, 2024

Hmm. I wonder.. Looking at #43464 - yes, when you have K8S executor, you will not be able to work without serviceAutomount set to true. But is it generally true for LocalExecutor and CeleryExecutor for example?

I believe should work without automount for those executors?

@jedcunningham
Copy link
Member

@potiuk you'd still need it for LocalExecutor and KubernetesPodOperator too.

But yes, with CeleryExecutor it should be fine. Or if you don't care about LE+KPO. Not sure removing completely is the right call.

@potiuk
Copy link
Member

potiuk commented Nov 19, 2024

@potiuk you'd still need it for LocalExecutor and KubernetesPodOperator too.

But yes, with CeleryExecutor it should be fine. Or if you don't care about LE+KPO. Not sure removing completely is the right call.

Yeah. For me it looks like maybe we should detect it when we need it and it is not set and provide a better diagnostics.

@romsharon98
Copy link
Contributor Author

didn't fully understand what are the cases that we will need it.

Copy link
Contributor

@amoghrajesh amoghrajesh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @jedcunningham and @potiuk comments.
Summarising the cases I think we should cover

Copy link
Contributor

@amoghrajesh amoghrajesh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good! Sorry for the delay @romsharon98
One small nit.

@romsharon98 romsharon98 force-pushed the remove-scheduler-automate-serviceaccount-token branch from 0ea1f3f to e423f77 Compare December 16, 2024 17:23
@eladkal eladkal force-pushed the remove-scheduler-automate-serviceaccount-token branch from 0558838 to 7018a19 Compare January 3, 2025 02:23
@romsharon98 romsharon98 force-pushed the remove-scheduler-automate-serviceaccount-token branch from 7018a19 to a0a6d5b Compare January 5, 2025 21:12
@romsharon98 romsharon98 merged commit 9ba279d into apache:main Jan 6, 2025
59 checks passed
HariGS-DB pushed a commit to HariGS-DB/airflow that referenced this pull request Jan 16, 2025
* remove scheduler automate serviceaccount token

* concider automount service account only if executor is CeleryExecutor

* change comment

* fix typo
got686-yandex pushed a commit to got686-yandex/airflow that referenced this pull request Jan 30, 2025
* remove scheduler automate serviceaccount token

* concider automount service account only if executor is CeleryExecutor

* change comment

* fix typo
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area:helm-chart Airflow Helm Chart

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Scheduler has no Kubernetes API access when disabling API token automounting

5 participants