ServiceAccounts grant Kubernetes API permissions to workloads. This validator detects when a ServiceAccount referred in a workload is not found.
Affected Resources: Deployment, DaemonSet, StatefulSet, CronJob, Job, ReplicaSet, Pod
kind: Deployment
spec:
template:
spec:
serviceAccountName: build-robot # Service Account not found
...
apiVersion: v1
kind: ServiceAccount
metadata:
name: robot # Different name
Please let us know if there are other built-in validation rules you would like to see in Kubevious to detect misconfigurations and violations to best practices. Optionally, you can provide your details so we can reach out to you with follow-up questions.