Hi there,

I'm trying out to run Flink on Kubernetes and I run into a problem with the
way Flink sets up AWS credentials to talk with S3 and the way we manage AWS
secrets in my company.

To give permissions to Flink I am using AWS keys embedded in flink.conf, as
per
https://ci.apache.org/projects/flink/flink-docs-stable/ops/deployment/aws.html#configure-access-credentials.
The problem there is that we rotate daily our AWS keys in order to mitigate
any eventual leak of keys. In order to make Flink pick up the new keys I
understand I have to restart it, but that means downtime, especially for
the jobs which have a large state to save.

I know that in Kubernetes land there are these two projects,
https://github.com/uswitch/kiam and https://github.com/jtblin/kube2iam
<https://github.com/jtblin/kube2iamm>, that make possible to associate IAM
policies to pods/containers. But they are not part of the "official"
Kubernetes software, which kinda surprises me.

Did anyone run into a similar problem? If so, how did you solve it?

Cheers,
Antonio

Reply via email to