Authorization Methods to Access Cloud Storage
You can use either a secret or Service Accounts to access your cloud storage, as detailed below.
Using Secrets
You can create a secret to access cloud provider resources. You can find the secret creation examples for different cloud providers in the next sections:
Accessing Resources on GCP
See Application Default Credentials to learn about the authentication procedure.
Accessing Resources on Azure
See Azure Storage Account Keys to learn about the authentication procedure.
Using Service Accounts
You can use Service Accounts
to access cloud provider resources without providing secretName
in HotBackup
, JetJob
, UCN
custom resources. To use this approach, you must provide serviceAccountName
in your Hazelcast CR.
Accessing GCP Resources using Workload Identity
Google Kubernetes Engine (GKE) Workload Identity is a feature that allows you to map a Kubernetes Service Account to a Google Cloud IAM (Identity and Access Management) Service Account so that users can manage pods permissions using IAM.
Create a Service Account using the following command:
To use it, you must annotate the service account you created with the following command:
See Service Accounts to learn more about it.
Accessing AWS Resources using IAM Roles for Service Accounts
IAM roles for service accounts is a feature that allows you to map a Kubernetes Service Account to an AWS IAM Role so that users can manage pods permissions using IAM.
Create a Service Account using the following command:
To use it, you must annotate the service account you created with the following command:
See IAM Roles for Service Accounts to learn more about it.