Difference between revisions of "Configuring Pods to use a Kubernetes service account"
Jump to navigation
Jump to search
Line 11: | Line 11: | ||
matchLabels: | matchLabels: | ||
app: my-app | app: my-app | ||
− | [[template | + | [[template]]: |
metadata: | metadata: | ||
labels: | labels: | ||
app: my-app | app: my-app | ||
− | spec: | + | [[spec:]] |
[[serviceAccountName]]: my-service-account | [[serviceAccountName]]: my-service-account | ||
containers: | containers: |
Revision as of 17:24, 6 September 2023
apiVersion: apps/v1 kind: Deployment metadata: name: my-app spec: selector: matchLabels: app: my-app template: metadata: labels: app: my-app spec: serviceAccountName: my-service-account containers: - name: my-app image: public.ecr.aws/nginx/nginx:X.XX
Related
- Granting access to an IAM principal to view Kubernetes resources on a cluster
- Kubernetes service account
See also
- Kubernetes service account, ServiceAccount:,
kubectl get serviceaccounts, kubectl create serviceaccount, kubectl describe serviceaccount
,kubernetes.io/service-account-token
, Kubernetes users, Kubernetes groups, Kubernetes roles,ServiceAccountTokenNodeBinding
- EKS RBAC, Amazon EKS authentication, Amazon EKS authorization,
aws eks get-token, aws-auth ConfigMap, aws-iam-authenticator, eksctl create iamidentitymapping, eksctl get iamidentitymapping, eks:AccessKubernetesApi, eks-connector
, K8s Cluster roles,AmazonEKSAdminPolicy
,AmazonEKSClusterAdminPolicy
Advertising: