IAM Service Account
A Kubernetes ServiceAccount (SA) can be attached to provide a specific identity to the processes running within the pods.
This configuration is primarily used to enable Workload Identity, where the Kubernetes ServiceAccount is mapped to a cloud provider IAM role. This mechanism allows pods to securely access external systems, such as cloud storage, without the need for managing static secrets or credentials.
apiVersion: v1kind: ServiceAccountmetadata: name: my-service-accountThen on the Armory resource, configure the service account.
apiVersion: io.kannika/v1alphakind: Backupmetadata: name: backupspec: source: "kafka" sink: "storage" serviceAccountName: "my-service-account"apiVersion: io.kannika/v1alphakind: Restoremetadata: name: restorespec: source: "storage" sink: "kafka" serviceAccountName: "my-service-account"apiVersion: io.kannika/v1alphakind: SchemaRegistryBackupmetadata: name: backupspec: storage: "storage" registry: "schema-registry" serviceAccountName: "my-service-account"apiVersion: io.kannika/v1alphakind: SchemaRegistryRestoremetadata: name: restorespec: storage: "storage" registry: "schema-registry" serviceAccountName: "my-service-account"