Yandex Cloud
  • Services
  • Solutions
  • Why Yandex Cloud
  • Pricing
  • Documentation
  • Contact us
Get started
Language / Region
© 2022 Yandex.Cloud LLC
Yandex Application Load Balancer
  • Getting started
  • Step-by-step instructions
    • All instructions
    • Target groups
      • Create a target group
      • Edit a target group
      • Delete a target group
    • Backend groups
      • Create a backend group
      • Edit a backend group
      • Delete a backend group
    • HTTP routers
      • Create HTTP router
      • Edit an HTTP router
      • Delete an HTTP router
    • L7 load balancers
      • Create an L7 load balancer
      • Edit an L7 load balancer
      • View L7 load balancer statistics
      • View the L7 load balancer logs
      • Get the ID of the log group of the L7 load balancer
      • Stopping and restarting an L7 load balancer
      • Delete an L7 load balancer
    • Ingress Controller for Managed Service for Kubernetes
      • Install an Ingress controller
      • Create or update resources based on configuration
  • Practical guidelines
    • Setting up a virtual hosting
    • Creating a load balancer with DDoS protection
    • Integrating an L7 load balancer with the CDN and Object Storage
    • Blue-green and canary deployment of service versions
    • Terminating TLS connections
    • Writing load balancer logs to PostgreSQL
  • Concepts
    • Overview
    • Load balancers
    • HTTP routers
    • Backend groups
    • Target groups
    • Quotas and limits
  • Tools
    • Ingress Controller for Managed Service for Kubernetes
      • Overview
      • How it works
      • Security groups
      • Service accounts
  • Access management
  • Pricing policy
  • API reference
    • Authentication in the API
    • gRPC
      • Overview
      • BackendGroupService
      • HttpRouterService
      • LoadBalancerService
      • TargetGroupService
      • VirtualHostService
      • OperationService
    • REST
      • Overview
      • BackendGroup
        • Overview
        • addBackend
        • create
        • delete
        • get
        • list
        • listOperations
        • removeBackend
        • update
        • updateBackend
      • HttpRouter
        • Overview
        • create
        • delete
        • get
        • list
        • listOperations
        • update
      • LoadBalancer
        • Overview
        • addListener
        • addSniMatch
        • create
        • delete
        • get
        • getTargetStates
        • list
        • listOperations
        • removeListener
        • removeSniMatch
        • start
        • stop
        • update
        • updateListener
        • updateSniMatch
      • TargetGroup
        • Overview
        • addTargets
        • create
        • delete
        • get
        • list
        • listOperations
        • removeTargets
        • update
      • VirtualHost
        • Overview
        • create
        • delete
        • get
        • list
        • removeRoute
        • update
        • updateRoute
  • Ingress controller reference
    • Overview
    • Ingress
    • HttpBackendGroup
    • Service
  • Log reference
  1. Tools
  2. Ingress Controller for Managed Service for Kubernetes
  3. Service accounts

Service account for Application Load Balancer ingress controller

Written by
Yandex Cloud

    A Application Load Balancer ingress controller for Managed Service for Kubernetes deploys infrastructure on behalf of a service account. This account requires the following permissions:

    Service Type of permission required Minimum role
    Application Load Balancer
    (roles)
    Manage service resources alb.editor
    Virtual Private Cloud
    (roles)
    Manage internal or external connectivity depending on load balancer type vpc.publicAdmin (external)
    vpc.privateAdmin (internal)
    Certificate Manager
    (roles)
    Obtain certificates (for HTTPS load balancers) certificate-manager.certificates.downloader
    Compute Cloud
    (roles)
    Get information on virtual machines created as Managed Service for Kubernetes cluster nodes compute.viewer

    An authorized key is used to authenticate the service account. The key must be specified in the saKeySecretKey value when installing a Helm chart with an ingress controller. For instance, if you created the key via the yc iam key create CLI command and saved it to sa-key.json, the chart install command could look like this:

    helm install \
      --namespace yc-alb-ingress \
      --set-file saKeySecretKey=sa-key.json \
      ...
    

    The key will be stored in the yc-alb-ingress-controller-sa-key secret in the namespace entered when installing the chart (yc-alb-ingress in the above example).

    Was the article helpful?

    Language / Region
    © 2022 Yandex.Cloud LLC