You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
adds a [projected volume](/docs/concepts/storage/projected-volumes/) to Pods,
234
235
and this volume includes a token for Kubernetes API access.
235
236
@@ -292,9 +293,11 @@ and are mounted into Pods using a projected volume.
292
293
The tokens obtained using this method have bounded lifetimes, and are automatically
293
294
invalidated when the Pod they are mounted into is deleted.
294
295
295
-
You can still [manually create](/docs/tasks/configure-pod-container/configure-service-account/#manually-create-an-api-token-for-a-serviceaccount) a Secret to hold a service account token; for example, if you need a token that never expires.
296
+
You can still [manually create](/docs/tasks/configure-pod-container/configure-service-account/#manually-create-an-api-token-for-a-serviceaccount)
297
+
a Secret to hold a service account token; for example, if you need a token that never expires.
296
298
297
-
Once you manually create a Secret and link it to a ServiceAccount, the Kubernetes control plane automatically populates the token into that Secret.
299
+
Once you manually create a Secret and link it to a ServiceAccount,
300
+
the Kubernetes control plane automatically populates the token into that Secret.
298
301
299
302
{{< note >}}
300
303
Although the manual mechanism for creating a long-lived ServiceAccount token exists,
@@ -318,7 +321,7 @@ metadata:
318
321
name: build-robot
319
322
namespace: default
320
323
secrets:
321
-
- name: build-robot-secret # usually NOT present for a manually generated token
324
+
- name: build-robot-secret # usually NOT present for a manually generated token
322
325
```
323
326
324
327
Beginning from version 1.29, legacy ServiceAccount tokens that were generated
@@ -387,7 +390,7 @@ verify the tokens during authentication.
An alternate setup to setting `--service-account-private-key-file` and `--service-account-key-file` flags is
390
-
to configure an external JWT signer for [external ServiceAccount token signing and key management](#external-serviceaccount-token-signing-and-key-management).
393
+
to configure an external JWT signer for [external ServiceAccount token signing and key management](#external-serviceaccount-token-signing-and-key-management).
391
394
Note that these setups are mutually exclusive and cannot be configured together.
392
395
393
396
### ServiceAccount admission controller
@@ -512,7 +515,7 @@ That manifest snippet defines a projected volume that combines information from
512
515
either when the pod is deleted or after a defined lifespan (by default, that is 1 hour).
513
516
The token is bound to the specific Pod and has the kube-apiserver as its audience.
514
517
1. A `configMap` source. The ConfigMap contains a bundle of certificate authority data. Pods can use these
515
-
certificates to make sure that they are connecting to your cluster's kube-apiserver (and not to middlebox
518
+
certificates to make sure that they are connecting to your cluster's kube-apiserver (and not to a middlebox
516
519
or an accidentally misconfigured peer).
517
520
1. A `downwardAPI` source. This `downwardAPI` volume makes the name of the namespace containing the Pod available
The kube-apiserver can be configured to use external signer for token signing and token verifying key management.
623
-
This feature enables kubernetes distributions to integrate with key management solutions of their choice (eg: HSMs, cloud KMSes) for service account credential signing and verification.
624
-
To configure kube-apiserver to use external-jwt-signer set the `--service-account-signing-endpoint` flag to the location of a Unix domain socket (UDS) on a filesystem, or be prefixed with an @ symbol and name a UDS in the abstract socket namespace.
625
-
At the configured UDS, shall be an RPC server which implements [ExternalJWTSigner](https://github.com/kubernetes/kubernetes/blob/release-1.32/staging/src/k8s.io/externaljwt/apis/v1alpha1/api.proto).
626
+
This feature enables kubernetes distributions to integrate with key management solutions of their choice
627
+
(for example, HSMs, cloud KMSes) for service account credential signing and verification.
628
+
To configure kube-apiserver to use external-jwt-signer set the `--service-account-signing-endpoint` flag
629
+
to the location of a Unix domain socket (UDS) on a filesystem, or be prefixed with an @ symbol and name
630
+
a UDS in the abstract socket namespace. At the configured UDS, shall be an RPC server which implements
The external-jwt-signer must be healthy and be ready to serve supported service account keys for the kube-apiserver to start.
627
633
628
-
Check out [KEP-740](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/740-service-account-external-signing) for more details on ExternalJWTSigner.
634
+
Check out [KEP-740](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/740-service-account-external-signing)
635
+
for more details on ExternalJWTSigner.
629
636
630
637
{{< note >}}
631
-
The kube-apiserver flags `--service-account-key-file` and `--service-account-signing-key-file` will continue to be used for reading from files unless `--service-account-signing-endpoint` is set; they are mutually exclusive ways of supporting JWT signing and authentication.
638
+
The kube-apiserver flags `--service-account-key-file` and `--service-account-signing-key-file` will continue
639
+
to be used for reading from files unless `--service-account-signing-endpoint` is set; they are mutually
640
+
exclusive ways of supporting JWT signing and authentication.
0 commit comments