|
You are here |
it20.info | ||
| | | | |
src-bin.com
|
|
| | | | | In You should have lots of AWS accounts, I made a case for isolating environments and even services in their own accounts to reap all sorts of security, reliability, and compliance benefits. With the right tools in hand (Substrate, for one), operating lots of accounts can be just as efficient | |
| | | | |
blog.ryanjarv.sh
|
|
| | | | | ||
| | | | |
golb.hplar.ch
|
|
| | | | | ||
| | | | |
blog.nuculabs.de
|
|
| | | Hi ?????, In this article I will talk about how to authenticate your applications to the Kubernetes API via the service accounts feature. Citing the Kubernetes docs, a service account for a pod: "provides an identity for processes that run in a Pod. When you (a human) access the cluster (for example, using kubectl), you are authenticated by the apiserver as a particular User Account (currently this is usually admin, unless your cluster administrator has customized your cluster). Processes in containers inside pods can also contact the apiserver. When they do, they are authenticated as a particular Service Account (for example, default)." ?? | ||