Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ServiceAccounts for kube-scheduler and kube-apiserver, remove default #99

Merged
merged 3 commits into from
Jan 2, 2019

Conversation

dghubble
Copy link
Member

@dghubble dghubble commented Jan 2, 2019

Require all components in kube-system define their own ServiceAccount, the default kube-system ServiceAccount is no longer bound.

  • Use a kube-scheduler ServiceAccount and ClusterRoleBinding
  • Use a kube-apiserver ServiceAccount and ClusterRoleBinding
    • Switch kube-apiserver from using the kube-system default service account (with cluster-admin) to using a kube-apiserver ServiceAccount bound the the cluster-admin ClusterRole (as before)
    • Remove the default-sa ClusterRoleBinding that allowed kube-apiserver and kube-scheduler (or other 3rd-party components added to kube-system) to use the kube-system default ServiceAccount for cluster-admin
  • Edit CA certificate CommonName to match upstream

@dghubble dghubble changed the title Always use service accounts Add ServiceAccounts for kube-scheduler and kube-apiserver, remove default Jan 2, 2019
* Switch kube-scheduler from using the kube-system default ServiceAccount
(with cluster-admin) to using a kube-scheduler ServiceAccount bound to
the builtin system:kube-scheduler and system:volume-scheduler
(required for StorageClass) ClusterRoles
* https://kubernetes.io/docs/reference/access-authn-authz/rbac/#core-component-roles
* Switch kube-apiserver from using the kube-system default ServicAccount
(with cluster-admin) to using a kube-apiserver ServiceAccount bound to
cluster-admin (as before)
* Remove the default-sa ClusterRoleBinding that allowed kube-apiserver
and kube-scheduler (or other 3rd-party components added to kube-system)
to use the kube-system default ServiceAccount for cluster-admin
* Require all future components in kube-system define their own
ServiceAccount
@dghubble dghubble merged commit f382415 into master Jan 2, 2019
@dghubble dghubble deleted the always-use-service-accounts branch January 2, 2019 06:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant