apiVersion: v1
import "k8s.io/api/core/v1"
ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets
apiVersion: v1
kind: ServiceAccount
metadata (ObjectMeta)
Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
automountServiceAccountToken (boolean)
AutomountServiceAccountToken indicates whether pods running as this service account should have an API token automatically mounted. Can be overridden at the pod level.
imagePullSecrets ([]LocalObjectReference)
Atomic: will be replaced during a merge
ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images in pods that reference this ServiceAccount. ImagePullSecrets are distinct from Secrets because Secrets can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet. More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
secrets ([]ObjectReference)
Patch strategy: merge on key name
Map: unique values on key name will be kept during a merge
Secrets is a list of the secrets in the same namespace that pods running using this ServiceAccount are allowed to use. Pods are only limited to this list if this service account has a "kubernetes.io/enforce-mountable-secrets" annotation set to "true". The "kubernetes.io/enforce-mountable-secrets" annotation is deprecated since v1.32. Prefer separate namespaces to isolate access to mounted secrets. This field should not be used to find auto-generated service account token secrets for use outside of pods. Instead, tokens can be requested directly using the TokenRequest API, or service account token secrets can be manually created. More info: https://kubernetes.io/docs/concepts/configuration/secret
ServiceAccountList is a list of ServiceAccount objects
apiVersion: v1
kind: ServiceAccountList
metadata (ListMeta)
Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
items ([]ServiceAccount), required
List of ServiceAccounts. More info: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
get read the specified ServiceAccountGET /api/v1/namespaces/{namespace}/serviceaccounts/{name}
name (in path): string, required
name of the ServiceAccount
namespace (in path): string, required
pretty (in query): string
200 (ServiceAccount): OK
401: Unauthorized
list list or watch objects of kind ServiceAccountGET /api/v1/namespaces/{namespace}/serviceaccounts
namespace (in path): string, required
allowWatchBookmarks (in query): boolean
continue (in query): string
fieldSelector (in query): string
labelSelector (in query): string
limit (in query): integer
pretty (in query): string
resourceVersion (in query): string
resourceVersionMatch (in query): string
sendInitialEvents (in query): boolean
timeoutSeconds (in query): integer
watch (in query): boolean
200 (ServiceAccountList): OK
401: Unauthorized
list list or watch objects of kind ServiceAccountGET /api/v1/serviceaccounts
allowWatchBookmarks (in query): boolean
continue (in query): string
fieldSelector (in query): string
labelSelector (in query): string
limit (in query): integer
pretty (in query): string
resourceVersion (in query): string
resourceVersionMatch (in query): string
sendInitialEvents (in query): boolean
timeoutSeconds (in query): integer
watch (in query): boolean
200 (ServiceAccountList): OK
401: Unauthorized
create create a ServiceAccountPOST /api/v1/namespaces/{namespace}/serviceaccounts
namespace (in path): string, required
body: ServiceAccount, required
dryRun (in query): string
fieldManager (in query): string
fieldValidation (in query): string
pretty (in query): string
200 (ServiceAccount): OK
201 (ServiceAccount): Created
202 (ServiceAccount): Accepted
401: Unauthorized
update replace the specified ServiceAccountPUT /api/v1/namespaces/{namespace}/serviceaccounts/{name}
name (in path): string, required
name of the ServiceAccount
namespace (in path): string, required
body: ServiceAccount, required
dryRun (in query): string
fieldManager (in query): string
fieldValidation (in query): string
pretty (in query): string
200 (ServiceAccount): OK
201 (ServiceAccount): Created
401: Unauthorized
patch partially update the specified ServiceAccountPATCH /api/v1/namespaces/{namespace}/serviceaccounts/{name}
name (in path): string, required
name of the ServiceAccount
namespace (in path): string, required
body: Patch, required
dryRun (in query): string
fieldManager (in query): string
fieldValidation (in query): string
force (in query): boolean
pretty (in query): string
200 (ServiceAccount): OK
201 (ServiceAccount): Created
401: Unauthorized
delete delete a ServiceAccountDELETE /api/v1/namespaces/{namespace}/serviceaccounts/{name}
name (in path): string, required
name of the ServiceAccount
namespace (in path): string, required
body: DeleteOptions
dryRun (in query): string
gracePeriodSeconds (in query): integer
ignoreStoreReadErrorWithClusterBreakingPotential (in query): boolean
pretty (in query): string
propagationPolicy (in query): string
200 (ServiceAccount): OK
202 (ServiceAccount): Accepted
401: Unauthorized
deletecollection delete collection of ServiceAccountDELETE /api/v1/namespaces/{namespace}/serviceaccounts
namespace (in path): string, required
body: DeleteOptions
continue (in query): string
dryRun (in query): string
fieldSelector (in query): string
gracePeriodSeconds (in query): integer
ignoreStoreReadErrorWithClusterBreakingPotential (in query): boolean
labelSelector (in query): string
limit (in query): integer
pretty (in query): string
propagationPolicy (in query): string
resourceVersion (in query): string
resourceVersionMatch (in query): string
sendInitialEvents (in query): boolean
timeoutSeconds (in query): integer
200 (Status): OK
401: Unauthorized
This page is automatically generated.
If you plan to report an issue with this page, mention that the page is auto-generated in your issue description. The fix may need to happen elsewhere in the Kubernetes project.