You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$ OIDC_ISSUER=$(oc get authentication.config cluster -o jsonpath='{.spec.serviceAccountIssuer}') \
53
+
&&
54
+
POOL_ID=$(echo "$OIDC_ISSUER" | awk -F'/' '{print $NF}' | sed 's/-oidc$//')
55
55
----
56
-
. Allow Kubernetes Service Accounts to impersonate the Google Service Account, SERVICE_ACCOUNT_EMAIL is the output of the commant used to created the service account in the step 2.
56
+
57
+
. Permit the Kubernetes Service Accounts to impersonate the Google Service Account:
57
58
+
58
59
[source,terminal]
59
60
----
60
-
$ gcloud iam service-accounts add-iam-policy-binding "$SERVICE_ACCOUNT_EMAIL" \
61
+
$ gcloud iam service-accounts add-iam-policy-binding "$SERVICE_ACCOUNT_EMAIL" \ # <1>
Note: credential-source-file should be always point to /var/run/secrets/storage/serviceaccount/token, this is where the operator will mount the token
86
+
<1> The `credential-source-file` parameter must always point to the `/var/run/secrets/storage/serviceaccount/token` path because the Operator mounts the token from this path.
87
+
<2> The path for saving the output file.
88
+
86
89
. Get the correct audience as follows:
87
90
+
88
91
[source,terminal]
89
92
----
90
93
gcloud iam workload-identity-pools providers describe "$PROVIDER_NAME" --format='value(oidc.allowedAudiences[0])'
91
94
----
92
-
+
93
-
. Create storage secret to be used by Tempo.
95
+
96
+
. Create a storage secret for the {TempoShortName}.
0 commit comments