[
https://issues.apache.org/jira/browse/FLINK-20664?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17253362#comment-17253362
]
Till Rohrmann commented on FLINK-20664:
---------------------------------------
Thanks for driving this effort. What in a situation like this always worked
best is to introduce a common configuration option like
{{kubernetes.service-account}} which is used for both JM and TM unless a more
specific configuration option {{kubernetes.service-account.jobmanager}} or
{{kubernetes.service-account.taskmanager}} has been configured. That way you
don't force people to configure two options if they are ok with using a single
service account for both processes.
> Support setting service account for TaskManager pod
> ---------------------------------------------------
>
> Key: FLINK-20664
> URL: https://issues.apache.org/jira/browse/FLINK-20664
> Project: Flink
> Issue Type: Bug
> Components: Deployment / Kubernetes
> Affects Versions: 1.12.0
> Reporter: Yang Wang
> Assignee: Boris Lublinsky
> Priority: Blocker
> Labels: pull-request-available
> Fix For: 1.13.0, 1.12.1
>
>
> Currently, we only set the service account for JobManager. The TaskManager is
> using the default service account. Before the KubernetesHAService is
> introduced, it works because the TaskManager does not need to access the K8s
> resource(e.g. ConfigMap) directly. But now the TaskManager needs to watch
> ConfigMap and retrieve leader address. So if the default service account does
> not have enough permission, users could not specify a valid service account
> for TaskManager.
>
> We should introduce a new config option for TaskManager service account.
> {{kubernetes.taskmanager.service-account}}
>
>
--
This message was sent by Atlassian Jira
(v8.3.4#803005)