You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If this issue is time-sensitive, I have submitted a corresponding issue with GCP support.
Bug Description
How it looks like for me:
I have a pipeline where I create IAMServiceAccount a bit later ServiceAccount/IAMPartialPolicy/IAMServiceAccountKey.
Sometimes I have the following situation IAMServiceAccountKey has Ready + UpToDate status, but if you open CRD description it doesn't have any status(private_key,public_key) at the same time you can find a new service account key.
Then it seems like it stays in this state until new reconcile and only after it create new SA key and CRD will be updated.
Looks like old service account key was not tracked(?).
When I destroy my env with all CRDs mentioned above I still have this key. Quite rare I had a situation where I had 2 keys after create/destroy process.
I played with creation intervals between IAMServiceAccount and IAMServiceAccountKey, but didn't find any connection.
Due to limitation of 10 keys per one service account we have to constantly manually delete these "untracked" keys.
Additional Diagnostic Information
Status IAMServiceAccountKey example until new reconcile,but new SA key could be found in GCP:
lazy-slackoth
changed the title
one IAMServiceAccountKey could creates multiple service account keys
one IAMServiceAccountKey could create multiple service account keys
Dec 9, 2024
Checklist
Bug Description
How it looks like for me:
I have a pipeline where I create IAMServiceAccount a bit later ServiceAccount/IAMPartialPolicy/IAMServiceAccountKey.
Sometimes I have the following situation IAMServiceAccountKey has Ready + UpToDate status, but if you open CRD description it doesn't have any status(private_key,public_key) at the same time you can find a new service account key.
Then it seems like it stays in this state until new reconcile and only after it create new SA key and CRD will be updated.
Looks like old service account key was not tracked(?).
When I destroy my env with all CRDs mentioned above I still have this key. Quite rare I had a situation where I had 2 keys after create/destroy process.
I played with creation intervals between IAMServiceAccount and IAMServiceAccountKey, but didn't find any connection.
Due to limitation of 10 keys per one service account we have to constantly manually delete these "untracked" keys.
Additional Diagnostic Information
Status IAMServiceAccountKey example until new reconcile,but new SA key could be found in GCP:
Nothing special in logs:
Kubernetes Cluster Version
v1.30.4
Config Connector Version
1.105.0
Config Connector Mode
cluster mode
Log Output
No response
Steps to reproduce the issue
In my case It's enough to recreate resource from yaml snippet multiple times(sometimes 2, sometimes 6) to get "untrackable" service account key/s.
YAML snippets
The text was updated successfully, but these errors were encountered: