Example setup of workload-identity into a Kubernetes cluster on GCP - https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity
-
Updated
Sep 15, 2019 - HCL
Example setup of workload-identity into a Kubernetes cluster on GCP - https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity
This guide demonstrates creating a Kubernetes private cluster in Google Kubernetes Engine (GKE) running a sample Kubernetes workload that connects to a Cloud SQL instance using the cloud-sql-proxy "sidecar" authenticated using Workload Identity (Beta).
GCP hands-on materials in Tunisia
Provisions a Google Kubernetes Engine, along with ArgoCD to bootstrap the cluster with applications
A demo on how to use Workload Identity on GCP to call Google Cloud API from an application deployed on GKE
GKE IAM role and workload identity sample project
Terraform module for creating workload identity in azure.
Configure OpenID Connect with GCP Workload Identity Federation
A demo repository of using Azure Functions in a Docker container using AKS Workload Identities for binding authentications
Build a private Kubernetes Cluster (GKE) and associated resources in Google Cloud using Terraform
Terraform-managed Azure Service Connection
Deployment manifests for Personal Applications
Add a description, image, and links to the workload-identity topic page so that developers can more easily learn about it.
To associate your repository with the workload-identity topic, visit your repo's landing page and select "manage topics."