Workload Identity Federation for GKE using the GitLab chart
The default configuration for external object storage in the charts uses secret keys. Workload Identity Federation for GKE makes it possible to grant access to object storage to the Kubernetes cluster using short-lived tokens. If you have an existing GKE cluster, read the Google documentation on how to update the node pool to use Workload Identity Federation.
Troubleshooting
Ensure that the Kubernetes ServiceAccount is linked to the IAM service account
via the iam.gke.io/gcp-service-account
annotation.
You can check whether Workload Identity is configured properly by querying the metadata endpoint inside the toolbox pod. The service account associated with the cluster should be returned:
$ curl -H "Metadata-Flavor: Google" http://169.254.169.254/computeMetadata/v1/instance/service-accounts/default/email
example@your-example-project.iam.gserviceaccount.com
This account should also be able to access the following scopes:
$ curl -H "Metadata-Flavor: Google" http://169.254.169.254/computeMetadata/v1/instance/service-accounts/default/scopes
https://www.googleapis.com/auth/cloud-platform
https://www.googleapis.com/auth/userinfo.email
Docs
Edit this page to fix an error or add an improvement in a merge request.
Create an issue to suggest an improvement to this page.
Product
Create an issue if there's something you don't like about this feature.
Propose functionality by submitting a feature request.
Feature availability and product trials
View pricing to see all GitLab tiers and features, or to upgrade.
Try GitLab for free with access to all features for 30 days.
Get help
If you didn't find what you were looking for, search the docs.
If you want help with something specific and could use community support, post on the GitLab forum.
For problems setting up or using this feature (depending on your GitLab subscription).
Request support