All pods managed by Polyaxon use the default service account created during the deployment of Polyaxon CE or Polyaxon Agent. This service account provides the necessary access to run operations using the default configuration, however, you may need to use a specific service account for some operations.
The amount of access which an operation need is dependent on what you need to achieve. For example, if you need to create a component that creates other Kubernetes resources, a volume claim or a config map, then the default service account will prevent any operation using this component from successfully running. Such a component will require ‘create’ privileges on any resource that it needs to create.
In order to provide a custom service account, you can leverage the environment section:
If you are running a distributed operation, you can provide a service account per replica.
For more details about providing a service account compatible with Polyaxon auxiliary containers, please check the service account specification in the environment section.
Note: Although you can grant any access rights to your service account, especially if you disable Polyaxon sidecar and Polyaxon init containers, we suggest that you read the minimum RBAC rules used in the default service account.
If you to define a service account globally, we suggest creating a preset. If you are using Polyaxon Cloud or Polyaxon EE, you can add the service account name to the default organization’s preset or the default project’s preset.