File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 5454# =============================================================================
5555# Pyroscope Pod Identity — bind the Pyroscope ServiceAccount to the CDK-managed
5656# pyroscope-eks-pod-role BEFORE installing Pyroscope, so the very first pod
57- # boot has S3 creds available.
57+ # boot has S3 creds available. Pyroscope writes blocks to S3 from boot, so
58+ # it cannot follow the Grafana pattern (install first, attach identity, restart)
59+ # — it would fail health checks before the restart.
5860# =============================================================================
5961
6062log_info " Binding Pyroscope ServiceAccount to pyroscope-eks-pod-role..."
61- # Create the ServiceAccount up front so the pod identity webhook has something
62- # to bind to. Helm will adopt it on install because names/namespaces match.
63+ # Pre-create the ServiceAccount with Helm 3 adoption metadata so the
64+ # subsequent `helm install pyroscope` adopts it instead of erroring on
65+ # "invalid ownership metadata; missing key app.kubernetes.io/managed-by".
6366kubectl apply -f - << EOF
6467apiVersion: v1
6568kind: ServiceAccount
@@ -68,6 +71,10 @@ metadata:
6871 namespace: ${NAMESPACE}
6972 labels:
7073 app.kubernetes.io/name: pyroscope
74+ app.kubernetes.io/managed-by: Helm
75+ annotations:
76+ meta.helm.sh/release-name: pyroscope
77+ meta.helm.sh/release-namespace: ${NAMESPACE}
7178EOF
7279
7380if ! aws eks list-pod-identity-associations --cluster-name " ${CLUSTER_NAME} " \
You can’t perform that action at this time.
0 commit comments