EIO-135: call out specific namespaces for default service accounts

This commit is contained in:
Nelson Roberts
2020-07-10 10:35:11 -07:00
committed by Catherine Luse
parent 66f181c29b
commit 549bef7fec
@@ -66,7 +66,7 @@ services:
#### Set `automountServiceAccountToken` to `false` for `default` service accounts
Kubernetes provides a default service account which is used by cluster workloads where no specific service account is assigned to the pod. Where access to the Kubernetes API from a pod is required, a specific service account should be created for that pod, and rights granted to that service account. The default service account should be configured such that it does not provide a service account token and does not have any explicit rights assignments.
For each namespace the **default** service account must include this value:
For each namespace including **default** and **kube-system** on a standard RKE install the **default** service account must include this value:
```
automountServiceAccountToken: false