This repository was archived by the owner on Jan 9, 2020. It is now read-only.

Description
Spark applications running in Kubernetes may need application credentials to access certain services, for example, to read data from or write data to database or storage services. As an example, for an Spark application to access Google Cloud Storage (GCS) or Cloud BigQuery through the GCS or BigQuery connectors, a GCP service account key with the right permissions granted must be injected and made available to the connectors. GCP service account keys are certainly not the only type of credentials. Other types of credentials may be needed to access other types of services outside GCP. So we need a generic way of injecting arbitrary application credentials in the form of Kubernetes secrets into the driver/executor Pods.