Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

helm: Allow for iRSA #52

Closed
jwitko opened this issue Jan 5, 2024 · 6 comments
Closed

helm: Allow for iRSA #52

jwitko opened this issue Jan 5, 2024 · 6 comments
Assignees
Labels
enhancement New feature or request help wanted Extra attention is needed
Milestone

Comments

@jwitko
Copy link

jwitko commented Jan 5, 2024

The helm chart currently only allows for hard-coded environment variable based AWS IAM access key and secret key input. It does not allow for not-specifying these and letting iRSA handle it via the kubernetes service account.

@prometherion prometherion added the enhancement New feature or request label Jan 13, 2024
@prometherion
Copy link
Member

I'm not an AWS expert here, please, correct me if I'm wrong, and if I'm missing the context that should be about the following environment variables:

valueFrom: {}
# secretKeyRef:
# key: access_key
# name: minio-key

secretKey:
value: ""
valueFrom: {}
# secretKeyRef:
# key: secret_key
# name: minio-key

If I understood correctly, we should make these ones optional to let the S3 client interact using the Kubernetes Service Account.

@prometherion prometherion added the help wanted Extra attention is needed label Jan 13, 2024
@jwitko
Copy link
Author

jwitko commented Jan 16, 2024

Yes and also changing the conditionals around these to not be supplied:

- name: S3_ACCESS_KEY
{{- if .Values.backup.s3.accessKey.value }}
value: {{ .Values.backup.s3.accessKey.value | quote }}
{{- else }}
valueFrom:
{{- toYaml .Values.backup.s3.accessKey.valueFrom | nindent 16 }}
{{- end }}
- name: S3_SECRET_KEY
{{- if .Values.backup.s3.secretKey.value }}
value: {{ .Values.backup.s3.secretKey.value | quote }}
{{- else }}
valueFrom:
{{- toYaml .Values.backup.s3.secretKey.valueFrom | nindent 16 }}
{{- end }}

@bsctl bsctl self-assigned this Aug 9, 2024
@bsctl
Copy link
Member

bsctl commented Aug 9, 2024

@jwitko @prometherion honestly, I would to move the backup script away from this chart and leave this duty to the datastore (human) operator as there are several ways to backup etcd in different environments. This issue is exactly the reason. Please note, this chart is not an etcd operator, so it should not mimic it. The etcd community is working to a new etcd operator and we'll switch to that once they done.

Anyway, we can leave the backup script in this repo as simple tool (as the restore one) for basic usage, leaving more
sophisticated users to implement their own backup strategy.

@bsctl
Copy link
Member

bsctl commented Aug 9, 2024

@kvaps for commenting

@kvaps
Copy link
Contributor

kvaps commented Aug 10, 2024

I don't mind, but we already switched to using
https://github.com/aenix-io/etcd-operator

Currently it already implements the same functionality as this Helm chart, except periodic defragmentation and backups which can simple done using cronjobs.

We're working on submitting this project to sig-etcd.
The working group already established:

This week we had a first meeting with SIGs, where we discovered features needed by the community to prepare the roadmap.

@bsctl
Copy link
Member

bsctl commented Aug 13, 2024

closed by #70

@bsctl bsctl closed this as completed Aug 13, 2024
@bsctl bsctl added this to the v0.8.0 milestone Aug 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

4 participants