Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Application Load Balancer
  • Getting started
    • Overview
    • Configuring security groups
    • Working with service accounts
    • Creating and updating resources via ingress controller configurations
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • L7 load balancer logs
  • Release notes
  1. Tools for Managed Service for Kubernetes
  2. Working with service accounts

Service account for Managed Service for Kubernetes Application Load Balancer tools

Written by
Yandex Cloud
Updated at November 11, 2025

Managed Service for Kubernetes Application Load Balancer tools, e.g., ingress controller and Gateway API, use a service account to deploy infrastructure. This account requires the following permissions:

Ingress controller
Gateway API

Tip

We recommend using the new Yandex Cloud Gwin controller instead of an Application Load Balancer Ingress controller.

Service Type of permission required Minimum required permissions
Application Load Balancer
(roles)
Service resource management alb.editor
Virtual Private Cloud
(roles)
Managing internal or external connectivity based on the load balancer type vpc.publicAdmin (external)
vpc.privateAdmin (internal)
Certificate Manager
(roles)
Obtaining HTTPS load balancer certificates certificate-manager.certificates.downloader
Compute Cloud
(roles)
Getting information about Managed Service for Kubernetes cluster node VMs compute.viewer
Service Type of permission required Minimum required permissions
Application Load Balancer
(roles)
Service resource management alb.editor
Virtual Private Cloud
(roles)
Managing internal or external connectivity based on the load balancer type vpc.publicAdmin (external)
vpc.privateAdmin (internal)
Certificate Manager
(roles)
Managing HTTPS load balancer certificates certificate-manager.certificates.admin
Compute Cloud
(roles)
Getting information about Managed Service for Kubernetes cluster node VMs compute.viewer

The service account authenticates using an authorized key. You must specify this key in the saKeySecretKey field when deploying a Helm chart with an ingress controller or Gateway API. For example, if you created your authorized key using the yc iam key create CLI command and stored it to sa-key.json, the Helm chart installation command may look like this:

helm install \
  --namespace yc-alb \
  --set-file saKeySecretKey=sa-key.json \
  ...

The system will store the authorized key as either Secret yc-alb-ingress-controller-sa-key or Secret yc-alb-gateway-api-controller-sa-key in the namespace specified during Helm chart deployment, e.g.,yc-alb.

Was the article helpful?

Previous
Configuring security groups
Next
Creating and updating resources via ingress controller configurations
© 2025 Direct Cursus Technology L.L.C.