-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
compute default service account does not have access to the global-game-images artifact registry repo #161
Comments
Have created a PR that will give the Compute Service Account the Artifact Repo reader role. |
#162 to cross-reference ^ |
Curious on something - is this a role that the compute instance would get by default when you enabled GKE? I've never had to manually enable this on any project 🤔 so why did this happen here? I'm wondering if #162 is actually just hiding a race condition on the GKE cluster, or am I off base? |
Actually, lemme rephrase -- should this be the GKE cluster have a @AlexBulankou can you share the exact input and output you were getting please? Was it an error in the Terraform, a specific image? Something else? |
I did not get any deployment errors, but the container could not pull the image before I added access explicitly. Not an expert, but intuitively I would be surprised if an registry created would have compute default service account by default, because it means that any cluster in the project has this access by default, not sure if this is desired behavior for many organizations (vs. enabling a dedicated service account for a given registry). |
I think this is fixed now, but to confirm:
Sorry, not sure I'm following - containers don't pull images. Do you were seeing Image Pull Backoffs in your GKE clusters? If so, which clusters? All of them? Some of them? Which workloads, which Deployments, which clusters. Did some work, did others not? Screenshots and details here would be very useful. |
Yes. I was seeing it on game server workloads, I did not check if it was on all of them or some of them. here's an example:
|
So if I look at my Looking at your project I see the same permissions set on that registry permissions - so the Looking at the permissions on the compute my project I see: Weirdly, when I look at your compute service account... it doesn't match this, it's missing the one highlighted here. Since we've merged #162 is that fixed now? I'm also wondering what extra org policies you may have in effect that is different from a "standard" GCP project. |
After following the demo steps I noticed that initially many workloads are left not initialized, because compute default service account (
[email protected]
) cannot pull the images as it does not have permissions to read from this registry. I fixed it manually but the IAM might be worth including in the Terraform configuration.The text was updated successfully, but these errors were encountered: