-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvements and bug fixes in DM config. #904
Conversation
* Create a service account to be used to authorize TFJobs and other work within the cluster. * Create a helper script to download service account keys and turn them into K8s keys * Fix some bugs in the docs. * Fix kubeflow#878 create a GCP service account for the user. * IAP script needs a GCP service account with network admin privileges. * Add network admin privileges to the admin service account. * Name the secrets in K8s so that be default the names are the same across the deployments. This way there's one less parameter to set for every deployment. * VM service account should have a unique name per deployment so deployments are isolated. * Need to grant the VM service account logs and monitoring access to support monitoring. * I don't think there's any reason to allow user to specify name of the VM service account in the YAML file right now.
/assign @ankushagarwal |
docs/gke/create_k8s_secrets.sh
Outdated
|
||
# TODO(jlewi): We should name the secrets more consistently based on the service account name. | ||
# We will need to update the component configs though | ||
gcloud --project=${PROJECT} iam service-accounts keys create ${SA_EMAIL}.json --iam-account $SA_EMAIL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: use ${SA_EMAIL}
@@ -286,9 +300,40 @@ TODO(jlewi): Do we need to serialize API activation | |||
members: | |||
- {{ 'serviceAccount:' + env['project_number'] + '@cloudservices.gserviceaccount.com' }} | |||
|
|||
{# servicemanagement.admin is needed by CloudEndpoints controller |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How do we manage deletion of IAM Role Bindings? When we delete the deployment, the service accounts go away but these IAM Role Bindings still lurk around.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good point. Created
#910
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ankushagarwal The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
/test all |
* Improvements and bug fixes in DM config. * Create a service account to be used to authorize TFJobs and other work within the cluster. * Create a helper script to download service account keys and turn them into K8s keys * Fix some bugs in the docs. * Fix kubeflow#878 create a GCP service account for the user. * IAP script needs a GCP service account with network admin privileges. * Add network admin privileges to the admin service account. * Name the secrets in K8s so that be default the names are the same across the deployments. This way there's one less parameter to set for every deployment. * VM service account should have a unique name per deployment so deployments are isolated. * Need to grant the VM service account logs and monitoring access to support monitoring. * I don't think there's any reason to allow user to specify name of the VM service account in the YAML file right now. * Address comments. * Autoformat jsonnet.
* Improvements and bug fixes in DM config. * Create a service account to be used to authorize TFJobs and other work within the cluster. * Create a helper script to download service account keys and turn them into K8s keys * Fix some bugs in the docs. * Fix kubeflow#878 create a GCP service account for the user. * IAP script needs a GCP service account with network admin privileges. * Add network admin privileges to the admin service account. * Name the secrets in K8s so that be default the names are the same across the deployments. This way there's one less parameter to set for every deployment. * VM service account should have a unique name per deployment so deployments are isolated. * Need to grant the VM service account logs and monitoring access to support monitoring. * I don't think there's any reason to allow user to specify name of the VM service account in the YAML file right now. * Address comments. * Autoformat jsonnet.
Create a service account to be used to authorize TFJobs and other work
within the cluster.
Create a helper script to download service account keys and turn
them into K8s keys
Fix some bugs in the docs.
Fix Deployment manager config should create service accounts and set IAM roles #878 create a GCP service account for the user.
IAP script needs a GCP service account with network admin privileges.
Add network admin privileges to the admin service account.
Name the secrets in K8s so that be default the names are the same across
the deployments. This way there's one less parameter to set for
every deployment.
VM service account should have a unique name per deployment so deployments
are isolated.
Need to grant the VM service account logs and monitoring access to support
monitoring.
I don't think there's any reason to allow user to specify name of the
VM service account in the YAML file right now.
This change is