-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move Google Service account resources into team namespaces #380
Comments
|
We should also move the team SA into team project. This allows for removal of Another related improvement is to let replicator create the |
I'm not convinced that this refactor is useful. However, I'm pretty certain that it will cause problems down the line. Can anyone give a clear explanation of the problem we're trying to solve? |
As stated in the original message:
We've had to increase the SA quota in cluster projects already. E.g in |
I missed the comments of this issue.
Can you elaborate, on both?
This is stated both in the original message and then again when asked. To me this seems like a obvious clean-up in how we provision service accounts for workloads and teams. This was done originally due to a limitation, which isn't there anymore. |
Here's why:
Also,
It can also be viewed as an unneccessary design change, as long as the limit is lifted. |
Ah okey. I think it's just misunderstood slightly. Even though the quota-bit isn't a limitation anymore, I still think (and interpreted Thomas that way too), that this is well worth doing.
Having team resources in the team project together with all the other team resources is not only natural and easier to understand/intuitive, and we don't have to have special handling of this case with an extra namespace. It also makes it easier when we talk about moving clusters and cluster-projects. |
Fair enough then. |
Currently, when an application uses a Google service, a Google service account is created in the
serviceaccounts
namespace.This hides one key resource from the teams, and it doesn't work well with owner references. It might also more easily hit the Service Account quota in the cluster project.
Tested today that cross project workload identity works as expected, it's just in Google Cloud Console that there's an error when referencing a workload identity provider URL and not an email.
So the suggestion is to migrate service accounts from the service accounts namespace and into each team project/namespace.
The text was updated successfully, but these errors were encountered: