ServiceAccounts grant Kubernetes API permissions to workloads. This validator detects ServiceAccounts that are not associated with any workloads. This check is ignored for "default" ServiceAccounts.
Affected Resources: ServiceAccount
apiVersion: v1
kind: ServiceAccount
metadata:
name: robot # Unused Service Account
kind: Deployment
spec:
template:
spec:
serviceAccountName: build-robot # Was this a typo?
...
Please let us know if there are other built-in validation rules you would like to see in Kubevious to detect misconfigurations and violations to best practices. Optionally, you can provide your details so we can reach out to you with follow-up questions.