K8SSAND-799 ⁃ Add support for service account token authentication to remote clusters #83
Closed
Description
In #82 I reported authentication issues with GKE. The OAuth token expires every hour and Google Cloud Tools is needed to renew it. We will face similar problems with other cloud providers. An alternative solution that is cloud provider-agnostic is to use service account tokens from the remote clusters. An approach was described in this article.
I propose that we create a script that does the following:
- Get the service account token from the k8ssandra-operator service account in the remote cluster
- Get the CA cert from the k8ssandra-operator service account in the remote cluster
- Create a kubeconfig for the remote cluster
- Create a kubeconfig secret in the control plane cluster
- Create a ClientConfig in the control plane cluster. It should reference the secret.
┆Issue is synchronized with this Jira Task by Unito
┆Epic: Multi-Cluster Deployment
┆Fix Versions: k8ssandra-operator-1.0.0-alpha.1
┆Issue Number: K8SSAND-799
┆Priority: Medium
Metadata
Assignees
Labels
No labels