Production and Polaris credentials #405
-
Hello, I've read many pages of Polaris documentation and code, but still not sure to uderstand how in Production, Polaris itself should be configured to retrieve his own credentials (AWS by example) to be allowed to ask token to STS for a catalog subScope request...
Is it obvious and I miss the point ?
Thank you |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
@lefebsy so the AWS credential example above is to show how you can pass in your AWS credential for Polaris service to use to communicate with AWS. Polaris is using AWS SDK which will loop through a set of auth methods and reading off from env variables if one of them. You can avoid this with annotations for K8S SA with IAM role/policy. |
Beta Was this translation helpful? Give feedback.
"About the kubernetes service account and your explanation, it seems it is clearly specific to AWS implementation. To be able to link with annotations external stuff like AWS IAM... I don't know if GCP or Azure did similar implementation in their kubernetes distribution. In vanilla kubernetes, service account scope is limited to kubernetes itself and image registries credentials, nothing about external object storage or external IAM to add privileges related to object storage outside kubernetes." -> not really right as the k8s manifest doesn't have anything to do with AWS. The support to auth with AWS can be done via different ways (such as env or assume role via annotation and SA). Quick…