Skip to content

K8SSAND-799 ⁃ Add support for service account token authentication to remote clusters #83

Closed
@jsanda

Description

In #82 I reported authentication issues with GKE. The OAuth token expires every hour and Google Cloud Tools is needed to renew it. We will face similar problems with other cloud providers. An alternative solution that is cloud provider-agnostic is to use service account tokens from the remote clusters. An approach was described in this article.

I propose that we create a script that does the following:

  • Get the service account token from the k8ssandra-operator service account in the remote cluster
  • Get the CA cert from the k8ssandra-operator service account in the remote cluster
  • Create a kubeconfig for the remote cluster
  • Create a kubeconfig secret in the control plane cluster
  • Create a ClientConfig in the control plane cluster. It should reference the secret.

┆Issue is synchronized with this Jira Task by Unito
┆Epic: Multi-Cluster Deployment
┆Fix Versions: k8ssandra-operator-1.0.0-alpha.1
┆Issue Number: K8SSAND-799
┆Priority: Medium

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions