Title: feast-operator: support setting the ServiceAccount annotations for cloud platform IAM use case · Issue #5302 · feast-dev/feast · GitHub
Open Graph Title: feast-operator: support setting the ServiceAccount annotations for cloud platform IAM use case · Issue #5302 · feast-dev/feast
X Title: feast-operator: support setting the ServiceAccount annotations for cloud platform IAM use case · Issue #5302 · feast-dev/feast
Description: Is your feature request related to a problem? Please describe. Kubernetes platforms on AWS and GKE allows pods to assume the IAM roles/service account by setting certain annotations on the ServiceAccount resource. In the background, this...
Open Graph Description: Is your feature request related to a problem? Please describe. Kubernetes platforms on AWS and GKE allows pods to assume the IAM roles/service account by setting certain annotations on the ServiceA...
X Description: Is your feature request related to a problem? Please describe. Kubernetes platforms on AWS and GKE allows pods to assume the IAM roles/service account by setting certain annotations on the ServiceA...
Opengraph URL: https://github.com/feast-dev/feast/issues/5302
X: @github
Domain: github.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"feast-operator: support setting the ServiceAccount annotations for cloud platform IAM use case","articleBody":"**Is your feature request related to a problem? Please describe.**\nKubernetes platforms on AWS and GKE allows pods to assume the IAM roles/service account by setting certain annotations on the ServiceAccount resource. In the background, this annotation will be used to inject the credentials required for the Pod to access internal services of the cloud platform.\n\nIn AWS EKS, it uses annotation: `eks.amazonaws.com/role-arn`\nIn GCP GKE, it uses annotation: `iam.gke.io/gcp-service-account`\n\n**Describe the solution you'd like**\nAdd section inside the FeatureStore CRD to set configure the annotations for the ServiceAccount that will be created. Maybe can add it to `featurestore.spec.services.offlineStore.serviceAccount.annotations`.\n\nedit: add specific to just `offlineStore` instead of directly under `services`\n\n**Describe alternatives you've considered**\nManually adding the annotation to the created ServiceAccount resource after the FeatureStore has been created and the feast-operator has created the ServiceAccount.\n\n**Additional context**\nI dug around the feast-operator code and found this [function](https://github.com/feast-dev/feast/blob/14f45eebd747d024a11c95dbd65c9ceb3ad0ca67/infra/feast-operator/internal/controller/services/services.go#L864-L870) that sets the metadata of the ServiceAccount. From this I think can be done to also add the annotations when specified in the FeatureStore CR spec.\n","author":{"url":"https://github.com/pokgak","@type":"Person","name":"pokgak"},"datePublished":"2025-04-28T11:11:33.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":7},"url":"https://github.com/5302/feast/issues/5302"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:9772ec7e-845a-3ad0-4d15-44f241f369b4 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | A04A:2A15D2:621AE7:8952A8:696E5B9B |
| html-safe-nonce | 53557b4013410b07f3e98eb2cec321f235e23e649558ece7e804676136e8f45f |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBMDRBOjJBMTVEMjo2MjFBRTc6ODk1MkE4OjY5NkU1QjlCIiwidmlzaXRvcl9pZCI6IjQ2MjAyMjE2NzQ5OTE1NDExNDciLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ== |
| visitor-hmac | 50724510ec30003932aacc8091558dbdf4203cfc6e832a9877c89f258581bcea |
| hovercard-subject-tag | issue:3024590006 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/feast-dev/feast/5302/issue_layout |
| twitter:image | https://opengraph.githubassets.com/d428518631f593fcad2915185bc98980a7d97d4a1ddcd72b0dfb17e91aaaa575/feast-dev/feast/issues/5302 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/d428518631f593fcad2915185bc98980a7d97d4a1ddcd72b0dfb17e91aaaa575/feast-dev/feast/issues/5302 |
| og:image:alt | Is your feature request related to a problem? Please describe. Kubernetes platforms on AWS and GKE allows pods to assume the IAM roles/service account by setting certain annotations on the ServiceA... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | pokgak |
| hostname | github.com |
| expected-hostname | github.com |
| None | f68b42d371252b0f236260d6234f4304a806fe5ac43d59faa21fb59d80df103b |
| turbo-cache-control | no-preview |
| go-import | github.com/feast-dev/feast git https://github.com/feast-dev/feast.git |
| octolytics-dimension-user_id | 57027613 |
| octolytics-dimension-user_login | feast-dev |
| octolytics-dimension-repository_id | 161133770 |
| octolytics-dimension-repository_nwo | feast-dev/feast |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 161133770 |
| octolytics-dimension-repository_network_root_nwo | feast-dev/feast |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 6b74bc8dbcd10b5d69fd9ee9d2cfdc8b35e18a4c |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width