How to use new service account key for the service account in GCP?

Hi, 

I have created the new service account key and also updated the overrides.yaml file with new key.

after updating , i have disabled the old service account key for testing. But still the application and services are using the old service account key and throwed error. 

Help me with how to switch from old key t new key for service account 

0 3 344
3 REPLIES 3

After updating overrides.yaml did you execute "apigeectl apply" ? You must check on the pods to confirm its recycled post  "apigeectl apply" (by checking the Age value on the "kubect get pods -n apigee" command)

Thanks

yes , i have executed the apply command and the pods got restarted . after restarting also the services were using old key.. 

How are you claiming the services are using the old key. 

Checkout the secrets ****-svc-account in the apigee namespace. If you look into the yaml descriptor of the secret, the value for key "private_key_id" will match to the SA key name in GCP.

The "apply" command will re-configure the kubernetes secrets "****-svc-account" with the contents of the GCP key file. This secret will be referenced within the pods.

Thanks