CloudWiki
Resource

Service Account

Kubernetes
Kubernetes
A service account provides an identity for processes that run in a Pod.
Terraform Name
terraform
kubernetes_service_account
Service Account
attributes:
  • metadata - (Required) Standard service account's metadata. For more info see Kubernetes reference
  • image_pull_secret - (Optional) A list of references to secrets in the same namespace to use for pulling any images in pods that reference this Service Account. For more info see Kubernetes reference
  • secret - (Optional) A list of secrets allowed to be used by pods running using this Service Account. For more info see Kubernetes reference
  • automount_service_account_token - (Optional) Boolean, true to enable automatic mounting of the service account token. Defaults to true.

Nested Blocks

metadata

Arguments

  • annotations - (Optional) An unstructured key value map stored with the service account that may be used to store arbitrary metadata.

Note

By default, the provider ignores any annotations whose key names end with kubernetes.io. This is necessary because such annotations can be mutated by server-side components and consequently cause a perpetual diff in the Terraform plan output. If you explicitly specify any such annotations in the configuration template then Terraform will consider these as normal resource attributes and manage them as expected (while still avoiding the perpetual diff problem). For more info see Kubernetes reference

  • generate_name - (Optional) Prefix, used by the server, to generate a unique name ONLY IF the name field has not been provided. This value will also be combined with a unique suffix. For more info see Kubernetes reference
  • labels - (Optional) Map of string keys and values that can be used to organize and categorize (scope and select) the service account. May match selectors of replication controllers and services.

Note

By default, the provider ignores any labels whose key names end with kubernetes.io. This is necessary because such labels can be mutated by server-side components and consequently cause a perpetual diff in the Terraform plan output. If you explicitly specify any such labels in the configuration template then Terraform will consider these as normal resource attributes and manage them as expected (while still avoiding the perpetual diff problem). For more info see Kubernetes reference

  • name - (Optional) Name of the service account, must be unique. Cannot be updated. For more info see Kubernetes reference
  • namespace - (Optional) Namespace defines the space within which name of the service account must be unique.

Attributes

  • generation - A sequence number representing a specific generation of the desired state.
  • resource_version - An opaque value that represents the internal version of this service account that can be used by clients to determine when service account has changed. For more info see Kubernetes reference
  • uid - The unique in time and space value for this service account. For more info see Kubernetes reference

image_pull_secret

Arguments

secret

Arguments

Associating resources with a
Service Account
Resources do not "belong" to a
Service Account
Rather, one or more Security Groups are associated to a resource.
Create
Service Account
via Terraform:
The following HCL creates a service account
Syntax:

resource "kubernetes_service_account" "example" {
 metadata {
   name = "terraform-example"
 }
 secret {
   name = "${kubernetes_secret.example.metadata.0.name}"
 }
}

resource "kubernetes_secret" "example" {
 metadata {
   name = "terraform-example"
 }
}

Create
Service Account
via CLI:
Parameters:

apiVersion: v1
kind: ServiceAccount
metadata:
 name: build-robot
automountServiceAccountToken: false
...

Example:

kubectl apply -f - <<EOF
apiVersion: v1
kind: ServiceAccount
metadata:
 name: build-robot
EOF

aws cost
Costs
Direct Cost
Indirect Cost
No items found.
Best Practices for
Service Account

Categorized by Availability, Security & Compliance and Cost

Low
Access allowed from VPN
No items found.
Low
Auto Scaling Group not in use
No items found.
Medium
Connections towards DynamoDB should be via VPC endpoints
No items found.
Medium
Container in CrashLoopBackOff state
No items found.
Low
EC2 with GPU capabilities
No items found.
Medium
EC2 with high privileged policies
No items found.
Medium
ECS cluster delete alarm
No items found.
Critical
ECS task with Admin access (*:*)
Medium
ECS task with high privileged policies
No items found.
Critical
EKS cluster delete alarm
No items found.
Medium
ElastiCache cluster delete alarm
No items found.
Medium
Ensure Container liveness probe is configured
No items found.
Medium
Ensure ECS task definition has memory limit
No items found.
Critical
Ensure EMR cluster master nodes are not publicly accessible
No items found.
More from
Kubernetes