Skip to content

Use Terraform-managed IRSA service accounts#3

Merged
stxkxs merged 5 commits intomainfrom
chore/taskfile
Mar 21, 2026
Merged

Use Terraform-managed IRSA service accounts#3
stxkxs merged 5 commits intomainfrom
chore/taskfile

Conversation

@stxkxs
Copy link
Copy Markdown
Owner

@stxkxs stxkxs commented Mar 21, 2026

Summary

  • Add serviceAccount.create: false to all IRSA-dependent addons (cert-manager, external-secrets, external-dns, loki, tempo, velero)
  • Pass clusterName dynamically to networking charts from ArgoCD cluster secret
  • ALB controller already had create: false from prior commit

Context

Terraform workload-identity module now creates K8s ServiceAccounts with IRSA annotations. Helm charts must not create their own.

Deploy order

  1. Destroy cluster-addons workspace in tofui
  2. Merge this PR
  3. Re-apply cluster-addons (creates IAM roles + K8s SAs)
  4. ArgoCD syncs — charts reference pre-existing SAs

stxkxs added 5 commits March 20, 2026 12:34
The Helm chart was creating its own service account without the
eks.amazonaws.com/role-arn annotation, so pods had no AWS credentials.
- Pass clusterName dynamically from ArgoCD cluster secret label
- Use pre-created IRSA service account instead of chart-created one
Terraform (workload-identity module) now creates the K8s ServiceAccount
with the IRSA annotation. Helm charts must not create their own SA.
@github-actions
Copy link
Copy Markdown

CI Results

Check Status
YAML Lint
Environment Kustomize Build
dev
staging
production

All validations passed.

@stxkxs stxkxs merged commit fec80d5 into main Mar 21, 2026
5 checks passed
@stxkxs stxkxs deleted the chore/taskfile branch March 21, 2026 23:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant