The Kubernetes API server should use a service account public key file for service accounts

Set up the kubernetes integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

A service account public key file should be explicitiy set for service accounts on the API server. By default, if no --service-account-key-file argument is specified to the apiserver, it uses the private key from the TLS serving certificate to verify service account tokens. To ensure that the keys for service account tokens can be rotated as needed, a separate public/private key pair should be used for signing service account tokens.

Remediation

Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and set the --service-account-key-file parameter to the public key file for service accounts: --service-account-key-file=<filename>