Linux - K8S - RBAC

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
# 3.安全机制
 
## 3.1 SA
 
```sh
# 创建测试SA,我们发现一个SA有相对应的secrets
[19:25:06 root@master1 security]#kubectl create -f - <<EOF
> apiVersion: v1
> kind: ServiceAccount
> metadata:
>   name: build-robot
> EOF
serviceaccount/build-robot created
 
[20:12:17 root@master1 security]#kubectl get sa,secrets
NAME                         SECRETS   AGE
serviceaccount/build-robot   1         7m39s
serviceaccount/default       1         21d
 
NAME                             TYPE                                  DATA   AGE
secret/build-robot-token-rwfsb   kubernetes.io/service-account-token   3      7m39s
secret/default-token-zjxfd       kubernetes.io/service-account-token   3      21d
 
 
# 结合pod测试
[20:20:52 root@master1 security]#cat robot.yaml
apiVersion: v1
kind: Pod
metadata:
  name: nginx
spec:
  containers:
  - image: 10.0.0.55:80/mykubernetes/nginx:1.21.3
    name: nginx
    volumeMounts:
    - mountPath: /var/run/secrets/kubernetes.io/serviceaccount
      name: build-robot-token-rwfsb
  serviceAccountName: build-robot
  volumes:
  - name: build-robot-token-rwfsb
    projected:
      sources:
      - serviceAccountToken:
          path: build-robot-token-rwfsb
          expirationSeconds: 7200
 
 
[20:20:44 root@master1 security]#kubectl describe pod nginx
Name:         nginx
Namespace:    default
Priority:     0
Node:         node2.noisedu.cn/10.0.0.54
Start Time:   Sun, 02 Jan 2022 20:20:44 +0800
Labels:       <none>
Annotations:  cni.projectcalico.org/containerID: 87d85747bcce0bce508455b4697e8ed2e6b387c3ef2511a7bd735fd288f5af13
              cni.projectcalico.org/podIP: 10.244.4.4/32
              cni.projectcalico.org/podIPs: 10.244.4.4/32
Status:       Running
IP:           10.244.4.4
IPs:
  IP:  10.244.4.4
Containers:
  nginx:
    Container ID:   docker://66696744862f0e95efaf6eda484df98deb96967ccb2d7ef79c284c47fc09b09f
    Image:          10.0.0.55:80/mykubernetes/nginx:1.21.3
    Image ID:       docker-pullable://10.0.0.55:80/mykubernetes/nginx@sha256:4424e31f2c366108433ecca7890ad527b243361577180dfd9a5bb36e828abf47
    Port:           <none>
    Host Port:      <none>
    State:          Running
      Started:      Sun, 02 Jan 2022 20:20:46 +0800
    Ready:          True
    Restart Count:  0
    Environment:    <none>
    Mounts:
      /var/run/secrets/kubernetes.io/serviceaccount from build-robot-token-rwfsb (rw)
Conditions:
  Type              Status
  Initialized       True
  Ready             True
  ContainersReady   True
  PodScheduled      True
Volumes:
  build-robot-token-rwfsb:
    Type:                    Projected (a volume that contains injected data from multiple sources)
    TokenExpirationSeconds:  7200
QoS Class:                   BestEffort
Node-Selectors:              <none>
Tolerations:                 node.kubernetes.io/not-ready:NoExecute op=Exists for 300s
                             node.kubernetes.io/unreachable:NoExecute op=Exists for 300s
Events:
  Type    Reason     Age   From               Message
  ----    ------     ----  ----               -------
  Normal  Scheduled  8s    default-scheduler  Successfully assigned default/nginx to node2.noisedu.cn
  Normal  Pulled     7s    kubelet            Container image "10.0.0.55:80/mykubernetes/nginx:1.21.3" already present on machine
  Normal  Created    6s    kubelet            Created container nginx
  Normal  Started    6s    kubelet            Started container nginx
 
 
 
 
```
 
## 3.2 UA
 
### user account 至少分为三个部分:
 
####    用户条目 - credentials设定具体的user account名称
 
####    集群 - cluster 设定该user account所工作的区域
 
####    上下文环境 - context 设定用户和集群的关系
 
```sh
[16:34:11 root@master1 ~]#kubectl config view
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.70:6443
  name: kubernetes
contexts:
- context:
    cluster: kubernetes
    user: kubernetes-admin
  name: kubernetes-admin@kubernetes
current-context: kubernetes-admin@kubernetes
kind: Config
preferences: {}
users:
- name: kubernetes-admin
  user:
    client-certificate-data: REDACTED
    client-key-data: REDACTED
 
```
 
#### 创建UA的流程主要是分为7个步骤,最后的结果和上面类似.
 
 1. #### 创建私钥
 
    ```sh
    [17:02:17 root@master1 security]#cd /etc/kubernetes/pki/
     
    [17:03:35 root@master1 pki]#umask 077; openssl genrsa -out noiselys.key 2048
    Generating RSA private key, 2048 bit long modulus (2 primes)
    ..................................................................................+++++
    ..+++++
    e is 65537 (0x010001)
     
    [17:04:14 root@master1 pki]#ll
    total 72
    drwxr-xr-x 3 root root 4096 Jan  3 17:04 ./
    drwxr-xr-x 5 root root 4096 Dec 12 00:18 ../
    -rw-r--r-- 1 root root 1294 Dec 12 00:18 apiserver.crt
    -rw-r--r-- 1 root root 1155 Dec 12 00:18 apiserver-etcd-client.crt
    -rw------- 1 root root 1675 Dec 12 00:18 apiserver-etcd-client.key
    -rw------- 1 root root 1675 Dec 12 00:18 apiserver.key
    -rw-r--r-- 1 root root 1164 Dec 12 00:18 apiserver-kubelet-client.crt
    -rw------- 1 root root 1679 Dec 12 00:18 apiserver-kubelet-client.key
    -rw-r--r-- 1 root root 1066 Dec 11 23:29 ca.crt
    -rw------- 1 root root 1675 Dec 11 23:29 ca.key
    drwxr-xr-x 2 root root 4096 Dec 11 23:29 etcd/
    -rw-r--r-- 1 root root 1078 Dec 11 23:29 front-proxy-ca.crt
    -rw------- 1 root root 1679 Dec 11 23:29 front-proxy-ca.key
    -rw-r--r-- 1 root root 1119 Dec 12 00:18 front-proxy-client.crt
    -rw------- 1 root root 1679 Dec 12 00:18 front-proxy-client.key
    -rw------- 1 root root 1679 Jan  3 17:04 noiselys.key
    -rw------- 1 root root 1675 Dec 11 23:29 sa.key
    -rw------- 1 root root  451 Dec 11 23:29 sa.pub
     
    ```
 
     
 
 2. #### 基于私钥文件创建证书签名请求
 
    ```sh
    [17:04:17 root@master1 pki]#openssl req -new -key noiselys.key -out noiselys.csr -subj "/CN=noiselys/O=noiselys"
    Can't load /root/.rnd into RNG
    140623717016000:error:2406F079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:88:Filename=/root/.rnd
     
    # 若是报这个error,可执行下面
    [17:07:23 root@master1 pki]#cd /root
    [17:08:00 root@master1 ~]#openssl rand -writerand .rnd
     
    # 再次生成证书签名文件
    [17:08:29 root@master1 pki]#rm -f noiselys.csr
    [17:08:35 root@master1 pki]#openssl req -new -key noiselys.key -out noiselys.csr -subj "/CN=noiselys/O=noiselys"
     
    [17:08:41 root@master1 pki]#ll
    total 76
    drwxr-xr-x 3 root root 4096 Jan  3 17:08 ./
    drwxr-xr-x 5 root root 4096 Dec 12 00:18 ../
    -rw-r--r-- 1 root root 1294 Dec 12 00:18 apiserver.crt
    -rw-r--r-- 1 root root 1155 Dec 12 00:18 apiserver-etcd-client.crt
    -rw------- 1 root root 1675 Dec 12 00:18 apiserver-etcd-client.key
    -rw------- 1 root root 1675 Dec 12 00:18 apiserver.key
    -rw-r--r-- 1 root root 1164 Dec 12 00:18 apiserver-kubelet-client.crt
    -rw------- 1 root root 1679 Dec 12 00:18 apiserver-kubelet-client.key
    -rw-r--r-- 1 root root 1066 Dec 11 23:29 ca.crt
    -rw------- 1 root root 1675 Dec 11 23:29 ca.key
    drwxr-xr-x 2 root root 4096 Dec 11 23:29 etcd/
    -rw-r--r-- 1 root root 1078 Dec 11 23:29 front-proxy-ca.crt
    -rw------- 1 root root 1679 Dec 11 23:29 front-proxy-ca.key
    -rw-r--r-- 1 root root 1119 Dec 12 00:18 front-proxy-client.crt
    -rw------- 1 root root 1679 Dec 12 00:18 front-proxy-client.key
    -rw------- 1 root root  915 Jan  3 17:08 noiselys.csr
    -rw------- 1 root root 1679 Jan  3 17:04 noiselys.key
    -rw------- 1 root root 1675 Dec 11 23:29 sa.key
    -rw------- 1 root root  451 Dec 11 23:29 sa.pub
     
     
    ```
 
     
 
 3. #### 基于私钥和签名请求生产证书文件
 
    ```sh
    [17:09:32 root@master1 pki]#openssl x509 -req -in noiselys.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out noiselys.crt -days 365
    Signature ok
    subject=CN = noiselys, O = noiselys
    Getting CA Private Key
    [17:11:44 root@master1 pki]#ll noise*
    -rw------- 1 root root 1017 Jan  3 17:11 noiselys.crt
    -rw------- 1 root root  915 Jan  3 17:08 noiselys.csr
    -rw------- 1 root root 1679 Jan  3 17:04 noiselys.key
     
    [17:11:49 root@master1 pki]#openssl x509 -in noiselys.crt -text -noout
    Certificate:
        Data:
            Version: 1 (0x0)
            Serial Number:
                45:60:a7:2a:61:6f:67:25:67:ed:2a:8f:6f:77:0b:f9:55:4c:b7:6c
            Signature Algorithm: sha256WithRSAEncryption
            Issuer: CN = kubernetes
            Validity
                Not Before: Jan  3 09:11:44 2022 GMT
                Not After : Jan  3 09:11:44 2023 GMT
            Subject: CN = noiselys, O = noiselys
            Subject Public Key Info:
                Public Key Algorithm: rsaEncryption
                    RSA Public-Key: (2048 bit)
                    Modulus:
                        00:e4:d1:fd:14:84:5f:f4:e6:5c:87:c3:c0:8e:f0:
                        8c:dc:16:c7:b3:76:42:46:a6:5d:ab:a2:3f:7a:25:
                        3d:92:64:af:49:27:ab:49:97:c4:ae:89:79:f5:a8:
                        60:40:b6:b2:44:bc:87:fd:79:75:0f:7e:99:6f:e0:
                        bd:fe:59:e4:6d:52:82:64:bd:a5:f5:b2:27:39:72:
                        fb:57:25:8c:54:f1:ce:93:d4:59:18:02:ae:d0:31:
                        33:07:1e:70:ee:e2:db:0b:31:26:c6:a7:64:a0:99:
                        5f:a7:57:17:09:98:d9:e4:12:a4:89:e6:fe:33:61:
                        f7:14:7c:b6:be:9d:5c:0d:57:32:b4:c1:2b:48:db:
                        97:ec:7a:64:f0:17:63:b3:35:16:4d:b5:ff:0d:69:
                        09:55:3b:7f:ea:2b:a2:62:54:37:1c:43:94:e8:c6:
                        f2:cb:63:85:76:61:71:1d:5b:98:ab:46:c9:4a:b1:
                        68:7e:ea:a0:fb:bc:b1:ba:16:f1:65:82:43:bc:56:
                        27:51:03:f3:9b:bd:c3:7d:f6:6a:eb:65:41:88:51:
                        08:21:36:c7:c3:ec:91:fc:8a:5c:5e:ea:fe:c0:46:
                        7a:18:69:8a:9e:cb:5a:cf:de:cc:e6:16:22:dd:96:
                        ca:bb:4d:fb:ed:44:e8:59:14:b8:ab:59:a3:c6:8d:
                        52:57
                    Exponent: 65537 (0x10001)
        Signature Algorithm: sha256WithRSAEncryption
             bb:61:ef:ad:91:da:b7:ac:45:c2:f0:6e:f8:a0:f4:66:06:aa:
             cd:e1:db:4c:a3:43:24:20:88:45:86:3e:1c:5f:88:9b:85:d1:
             70:52:47:13:fa:ba:e1:87:2a:08:b1:a8:fe:5a:5f:7a:01:46:
             b4:6d:9a:fd:2c:14:6b:eb:23:b1:a6:31:2f:7b:2d:da:9f:04:
             fa:f5:19:f1:d9:41:5b:0a:7b:3e:b7:b9:3b:32:b2:12:cc:04:
             38:4c:1f:63:df:c9:c5:d5:82:38:a2:7c:5f:27:9f:94:46:3c:
             cb:c1:32:6c:ed:c5:02:b4:2f:bf:9f:b7:66:24:18:f0:a7:80:
             71:68:5a:4f:30:02:f3:ef:fb:0b:9f:2b:ce:b1:59:8d:f7:d3:
             8a:92:88:2e:9c:16:91:17:ec:b7:4c:2a:87:81:c5:f9:30:ed:
             94:dd:b2:b2:29:fb:86:f1:db:7f:11:d3:ea:ac:46:a3:bb:65:
             ac:84:cc:04:77:7b:3d:70:bf:34:f5:59:b0:4b:b4:fa:af:8d:
             2b:d0:83:aa:cc:7f:0a:68:d0:a8:40:3a:5c:fe:e7:cc:45:5e:
             0f:dd:01:42:69:3b:9d:40:d0:a0:95:ff:42:42:cf:6b:4e:8a:
             00:d3:4c:bb:37:57:65:51:2a:10:0a:15:33:2d:58:2f:a9:d4:
             50:d7:c3:b4
     
    ```
 
     
 
 4. #### 基于tls文件在k8s上创建用户
 
    ```sh
    [17:12:30 root@master1 pki]#kubectl config set-credentials noiselys --client-certificate=noiselys.crt --client-key=noiselys.key --embed-certs=true --kubeconfig=/data/noiselys.conf
    User "noiselys" set.
    [17:15:11 root@master1 pki]#kubectl config view --kubeconfig=/data/noiselys.conf
    apiVersion: v1
    clusters: null
    contexts: null
    current-context: ""
    kind: Config
    preferences: {}
    users:
    - name: noiselys
      user:
        client-certificate-data: REDACTED
        client-key-data: REDACTED
     
    ```
 
     
 
 5. #### 创建工作区域 - cluster
 
    ```shell
    [17:16:54 root@master1 pki]#kubectl config set-cluster mycluster --server="https://10.0.0.70:6443" --certificate-authority=/etc/kubernetes/pki/ca.crt --embed-certs=true --kubeconfig=/data/noiselys.conf
    Cluster "mycluster" set.
    [17:20:23 root@master1 pki]#kubectl config view --kubeconfig=/data/noiselys.conf
    apiVersion: v1
    clusters:
    - cluster:
        certificate-authority-data: DATA+OMITTED
        server: https://10.0.0.70:6443
      name: mycluster
    contexts: null
    current-context: ""
    kind: Config
    preferences: {}
    users:
    - name: noiselys
      user:
        client-certificate-data: REDACTED
        client-key-data: REDACTED
     
    ```
 
     
 
 6. #### 将cluster和user关联起来 - context
 
    ```shell
    [17:20:39 root@master1 pki]#kubectl config set-context noiselys@mycluster --cluster=mycluster --user=noiselys --kubeconfig=/data/noiselys.conf
    Context "noiselys@mycluster" created.
    [17:22:37 root@master1 pki]#kubectl config view --kubeconfig=/data/noiselys.conf
    apiVersion: v1
    clusters:
    - cluster:
        certificate-authority-data: DATA+OMITTED
        server: https://10.0.0.70:6443
      name: mycluster
    contexts:
    - context:
        cluster: mycluster
        user: noiselys
      name: noiselys@mycluster
    current-context: ""
    kind: Config
    preferences: {}
    users:
    - name: noiselys
      user:
        client-certificate-data: REDACTED
        client-key-data: REDACTED
     
    ```
 
     
 
 7. #### 验证结果
 
    ```sh
    # 上面的current-context是空,我们需要切换一下用户
    [17:24:53 root@master1 pki]#kubectl config use-context noiselys@mycluster --kubeconfig=/data/noiselys.conf
    Switched to context "noiselys@mycluster".
    [17:25:01 root@master1 pki]#kubectl config view --kubeconfig=/data/noiselys.conf
    apiVersion: v1
    clusters:
    - cluster:
        certificate-authority-data: DATA+OMITTED
        server: https://10.0.0.70:6443
      name: mycluster
    contexts:
    - context:
        cluster: mycluster
        user: noiselys
      name: noiselys@mycluster
    current-context: noiselys@mycluster
    kind: Config
    preferences: {}
    users:
    - name: noiselys
      user:
        client-certificate-data: REDACTED
        client-key-data: REDACTED
         
    # 但是关于权限我们还未设置,所以无法得到资源信息
    [17:25:09 root@master1 pki]#kubectl get pod --kubeconfig=/data/noiselys.conf
    Error from server (Forbidden): pods is forbidden: User "noiselys" cannot list resource "pods" in API group "" in the namespace "default"
     
    # 关于查看conf,我们有三种方法,从下面可以看出,推荐第一种
    # 如果想多个配置文件并行,可以加入到环境变量KUBECONFIG,用:隔开
    [17:26:05 root@master1 pki]#kubectl config --help
    Modify kubeconfig files using subcommands like "kubectl config set current-context my-context"
     
     The loading order follows these rules:
     
      1.  If the --kubeconfig flag is set, then only that file is loaded. The flag may only be set once and no merging takes
    place.
      2.  If $KUBECONFIG environment variable is set, then it is used as a list of paths (normal path delimiting rules for
    your system). These paths are merged. When a value is modified, it is modified in the file that defines the stanza. When
    a value is created, it is created in the first file that exists. If no files in the chain exist, then it creates the
    last file in the list.
      3.  Otherwise, ${HOME}/.kube/config is used and no merging takes place.
     
     
    ```
 
     
 
## RBAC授权控制
 
### 默认的api-server属性
 
```sh
[22:43:21 root@master1 pki]#cat /etc/kubernetes/manifests/kube-apiserver.yaml
apiVersion: v1
kind: Pod
metadata:
  annotations:
    kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 10.0.0.50:6443
  creationTimestamp: null
  labels:
    component: kube-apiserver
    tier: control-plane
  name: kube-apiserver
  namespace: kube-system
spec:
  containers:
  - command:
    - kube-apiserver
    - --advertise-address=10.0.0.50
    - --allow-privileged=true
    - --authorization-mode=Node,RBAC
 
```
 
## RBAC简单实践
 
### 建立一个role,可以允许用户操作deployment,pod,rs的所有权限
 
```sh
[14:06:33 root@master1 security]#cat 02-security-myrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
  name: myrole
rules:
- apiGroups: ["", "extensions", "apps"]
  resources: ["pods", "deployments", "replicasets"]
  verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
[14:06:35 root@master1 security]#kubectl apply -f 02-security-myrole.yaml
role.rbac.authorization.k8s.io/myrole created
[14:08:07 root@master1 security]#kubectl get role
NAME     CREATED AT
myrole   2022-01-09T06:08:07Z
[14:08:12 root@master1 security]#kubectl describe role myrole
Name:         myrole
Labels:       <none>
Annotations:  <none>
PolicyRule:
  Resources               Non-Resource URLs  Resource Names  Verbs
  ---------               -----------------  --------------  -----
  deployments             []                 []              [get list watch create update patch delete]
  pods                    []                 []              [get list watch create update patch delete]
  replicasets             []                 []              [get list watch create update patch delete]
  deployments.apps        []                 []              [get list watch create update patch delete]
  pods.apps               []                 []              [get list watch create update patch delete]
  replicasets.apps        []                 []              [get list watch create update patch delete]
  deployments.extensions  []                 []              [get list watch create update patch delete]
  pods.extensions         []                 []              [get list watch create update patch delete]
  replicasets.extensions  []                 []              [get list watch create update patch delete]
 
```
 
### 建立role和ua之间的关联rolebinding
 
```
^[[A^[[B[14:12:13 root@master1 security]#cat 03-security-rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  name: noiselys-myrole
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: Role
  name: myrole
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: User
  name: noiselys
[14:13:08 root@master1 security]#kubectl apply -f 03-security-rolebinding.yaml
rolebinding.rbac.authorization.k8s.io/noiselys-myrole created
[14:13:15 root@master1 security]#kubectl get rolebindings
NAME              ROLE          AGE
noiselys-myrole   Role/myrole   32s
[14:13:47 root@master1 security]#kubectl describe rolebindings noiselys-myrole
Name:         noiselys-myrole
Labels:       <none>
Annotations:  <none>
Role:
  Kind:  Role
  Name:  myrole
Subjects:
  Kind  Name      Namespace
  ----  ----      ---------
  User  noiselys 
 
 
# 此时,我们默认的namespace为default
[14:14:17 root@master1 security]#kubectl get pods --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
[14:17:36 root@master1 security]#kubectl get pods -n kube-system --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
Error from server (Forbidden): pods is forbidden: User "noiselys" cannot list resource "pods" in API group "" in the namespace "kube-system"
 
# 检查资源对象的权限范围,我们前面定义role只包含了pod,deployment,rs。
[14:19:54 root@master1 security]#kubectl get deployments --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
[14:19:59 root@master1 security]#kubectl get pod --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
[14:20:04 root@master1 security]#kubectl get rs --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
[14:20:09 root@master1 security]#kubectl get secrets --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
Error from server (Forbidden): secrets is forbidden: User "noiselys" cannot list resource "secrets" in API group "" in the namespace "default"
 
#
```
 
### 集群绑定,cluster级别的主要涉及clusterrole和clusterrolebinding,以此可以操作多个namespace
 
```
[14:22:43 root@master1 security]#cat 04-security-myclusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: myclusterrole
rules:
- apiGroups: [""]
  resources: ["pods"]
  verbs: ["get", "list", "watch"]
[14:23:36 root@master1 security]#kubectl apply -f 04-security-myclusterrole.yaml
clusterrole.rbac.authorization.k8s.io/myclusterrole created
[14:24:38 root@master1 security]#kubectl get clusterrole | grep mycluster
myclusterrole                                                          2022-01-09T06:24:31Z
[14:24:59 root@master1 security]#kubectl describe clusterrole myclusterrole
Name:         myclusterrole
Labels:       <none>
Annotations:  <none>
PolicyRule:
  Resources  Non-Resource URLs  Resource Names  Verbs
  ---------  -----------------  --------------  -----
  pods       []                 []              [get list watch]
 
```
 
### 建立完clusterrole,我们就可以跟着进行角色绑定,注意clusterrolebinding仅仅允许集群角色进行和其绑定,普通的role无效
 
```
[14:28:35 root@master1 security]#cat 05-security-myclusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: myclusterrolebinding
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: myclusterrole
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: User
  name: noiselys
[14:28:39 root@master1 security]#kubectl apply -f 05-security-myclusterrolebinding.yaml
clusterrolebinding.rbac.authorization.k8s.io/myclusterrolebinding created
[14:29:07 root@master1 security]#kubectl get clusterrolebindings | grep my
myclusterrolebinding                                   ClusterRole/myclusterrole 
[14:29:11 root@master1 security]#kubectl describe clusterrolebindings myclusterrolebinding
Name:         myclusterrolebinding
Labels:       <none>
Annotations:  <none>
Role:
  Kind:  ClusterRole
  Name:  myclusterrole
Subjects:
  Kind  Name      Namespace
  ----  ----      ---------
  User  noiselys 
 
# 检验,因为是集群角色,所以可以看到不同的namespace以及资源对象
[14:29:31 root@master1 security]#kubectl get pods --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
[14:30:26 root@master1 security]#kubectl get pods -n kube-system --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
NAME                                         READY   STATUS    RESTARTS         AGE
calico-kube-controllers-6fb865d84f-4lhbz     1/1     Running   13 (5d15h ago)   28d
calico-node-7hj44                            1/1     Running   5 (5d15h ago)    28d
calico-node-hk2r2                            1/1     Running   10 (5d15h ago)   28d
calico-node-kmmwm                            1/1     Running   11 (5d15h ago)   28d
calico-node-ns2ff                            1/1     Running   5 (5d15h ago)    28d
calico-node-qv7nn                            1/1     Running   5 (5d15h ago)    28d
coredns-76b4d8bc8f-d69q9                     1/1     Running   11 (5d15h ago)   28d
coredns-76b4d8bc8f-ndsg9                     1/1     Running   11 (5d15h ago)   28d
etcd-master1                                 1/1     Running   12 (5d15h ago)   28d
etcd-master2.noisedu.cn                      1/1     Running   13 (5d15h ago)   28d
etcd-master3.noisedu.cn                      1/1     Running   13 (5d15h ago)   28d
kube-apiserver-master1                       1/1     Running   13 (5d15h ago)   28d
kube-apiserver-master2.noisedu.cn            1/1     Running   14 (5d15h ago)   28d
kube-apiserver-master3.noisedu.cn            1/1     Running   14 (5d15h ago)   28d
kube-controller-manager-master1              1/1     Running   13 (5d15h ago)   28d
kube-controller-manager-master2.noisedu.cn   1/1     Running   5 (5d15h ago)    28d
kube-controller-manager-master3.noisedu.cn   1/1     Running   8 (5d15h ago)    28d
kube-proxy-6lw45                             1/1     Running   5 (5d15h ago)    28d
kube-proxy-9bjch                             1/1     Running   5 (5d15h ago)    28d
kube-proxy-b8g7m                             1/1     Running   10 (5d15h ago)   28d
kube-proxy-bbrxh                             1/1     Running   5 (5d15h ago)    28d
kube-proxy-pm6jk                             1/1     Running   11 (5d15h ago)   28d
kube-scheduler-master1                       1/1     Running   12 (5d15h ago)   28d
kube-scheduler-master2.noisedu.cn            1/1     Running   6 (5d15h ago)    28d
kube-scheduler-master3.noisedu.cn            1/1     Running   6 (5d15h ago)    28d
 
```
 
## RBAC混合实验
 
### 删除之前各种binding,只留下myclusterrole
 
```
[14:37:44 root@master1 security]#kubectl get clusterrole | grep my
myclusterrole                                                          2022-01-09T06:37:04Z
```
 
### 通过rolebinding的clusterrole,只能访问role本身指定的namespace
 
```
[14:37:51 root@master1 security]#cat 06-security-hunhebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  name: hunherole
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: myclusterrole
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: User
  name: wangss
[14:39:07 root@master1 security]#vim 06-security-hunhebinding.yaml
[14:39:25 root@master1 security]#kubectl apply -f 06-security-hunhebinding.yaml
rolebinding.rbac.authorization.k8s.io/hunherole created
[14:39:31 root@master1 security]#kubectl get rolebindings
NAME        ROLE                        AGE
hunherole   ClusterRole/myclusterrole   59s
[14:40:30 root@master1 security]#kubectl describe rolebindings hunherole
Name:         hunherole
Labels:       <none>
Annotations:  <none>
Role:
  Kind:  ClusterRole
  Name:  myclusterrole
Subjects:
  Kind  Name      Namespace
  ----  ----      ---------
  User  noiselys 
# 校验发现,只能访问default的namespace
[14:40:46 root@master1 security]#kubectl get pods -n kube-system --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
Error from server (Forbidden): pods is forbidden: User "noiselys" cannot list resource "pods" in API group "" in the namespace "kube-system"
[14:42:16 root@master1 security]#kubectl get pods --context=noiselys@mycluster --kubeconfig=/data/noiselys.conf
No resources found in default namespace.
 
```
 
## 服务认证
 
### 此次实验我们以dashboard为例,从网上下载官方的dashboard的yaml文件
 
```http
https://raw.githubusercontent.com/kubernetes/dashboard/v2.3.1/aio/deploy/recommended.yaml
修改添加nodeport和本地镜像等。
```
 
```sh
# 查看dashboard
[15:07:56 root@master1 dashboard]#kubectl apply -f recommended.yaml
namespace/kubernetes-dashboard created
serviceaccount/kubernetes-dashboard created
service/kubernetes-dashboard created
secret/kubernetes-dashboard-certs created
secret/kubernetes-dashboard-csrf created
secret/kubernetes-dashboard-key-holder created
configmap/kubernetes-dashboard-settings created
role.rbac.authorization.k8s.io/kubernetes-dashboard created
clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard created
rolebinding.rbac.authorization.k8s.io/kubernetes-dashboard created
clusterrolebinding.rbac.authorization.k8s.io/kubernetes-dashboard created
deployment.apps/kubernetes-dashboard created
service/dashboard-metrics-scraper created
Warning: spec.template.metadata.annotations[seccomp.security.alpha.kubernetes.io/pod]: deprecated since v1.19; use the "seccompProfile" field instead
deployment.apps/dashboard-metrics-scraper created
 
# 访问https://10.0.0.50:30443/#/login
 
```
 
![image-20220109151425952](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109151425952.png)
 
#### 为了更好的实验,我们提前删除dashboard默认的绑定
 
```sh
[15:23:41 root@master1 dashboard]#kubectl delete clusterrolebindings kubernetes-dashboard
clusterrolebinding.rbac.authorization.k8s.io "kubernetes-dashboard" deleted
```
 
#### 第一步创建SA,以及创建基于clusterrolebinding的clusterrole
 
```sh
[15:30:24 root@master1 security]#cat 07-security-dashboard-admin.yaml
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: dashboard-admin
  annotations:
    rbac.authorization.kubernetes.io/autoupdate: "true"
roleRef:
  kind: ClusterRole
  name: cluster-admin
  apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
  name: dashboard-admin
  namespace: kube-system
 
---
apiVersion: v1
kind: ServiceAccount
metadata:
  name: dashboard-admin
  namespace: kube-system
  labels:
    kubernetes.io/cluster-service: "true"
    addonmanager.kubernetes.io/mode: Reconcile
[15:30:26 root@master1 security]#kubectl apply -f 07-security-dashboard-admin.yaml
clusterrolebinding.rbac.authorization.k8s.io/dashboard-admin created
serviceaccount/dashboard-admin created
[15:31:34 root@master1 security]#kubectl get clusterrole,sa -o wide -n kube-system | grep dashboard
clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard                                                   2022-01-09T07:08:07Z
serviceaccount/dashboard-admin                      1         48s
 
# 用生成的secret的token尝试登录dashboard
[15:31:52 root@master1 security]#kubectl get secret -n kube-system | grep dashboard
dashboard-admin-token-nkqkv                      kubernetes.io/service-account-token   3      3m15s
[15:34:29 root@master1 security]#kubectl describe secret dashboard-admin-token-nkqkv -n kube-system
Name:         dashboard-admin-token-nkqkv
Namespace:    kube-system
Labels:       <none>
Annotations:  kubernetes.io/service-account.name: dashboard-admin
              kubernetes.io/service-account.uid: 89d47555-59b2-41d1-ba61-ad77d1f48b05
 
Type:  kubernetes.io/service-account-token
 
Data
====
ca.crt:     1066 bytes
namespace:  11 bytes
token:      eyJhbGciOiJSUzI1NiIsImtpZCI6IjJIcTUtNjJ0d1NBYVppekdsUFR6bFF2NkhBN3ZPajZWREd3aDZlXzMtYk0ifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJrdWJlLXN5c3RlbSIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VjcmV0Lm5hbWUiOiJkYXNoYm9hcmQtYWRtaW4tdG9rZW4tbmtxa3YiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC5uYW1lIjoiZGFzaGJvYXJkLWFkbWluIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiODlkNDc1NTUtNTliMi00MWQxLWJhNjEtYWQ3N2QxZjQ4YjA1Iiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50Omt1YmUtc3lzdGVtOmRhc2hib2FyZC1hZG1pbiJ9.d9JwS3W46tTneUnW2dy-FJcPXa22hhsk9H2f6htyP-NPAxRNpGt5bDiOAFHUVqgClRzG0BptzZvIwTFRCRgJkEK6Y3tihNXBBV-t4mSEY02bLmScOeZaO4m5DQXNVBTfEKpT7HYJqObHnyEdqmPpP2cOvQkKqrYwqDJnczkyhIA4Z-ZfYd7ep-cOYTnLQVM3dGKx0rTL9yRnlVnynHLUxYHLg0M7nbDYvtYo5A27BwlCXhxGL_ulB7UCkE6RUlrsaX6ZSuiA9eH4J38jesC1lYKdBpTRMNl6Bmh6N82LoUd1pb9Qgd6wE_BZA25P0TFyl_b-EL9Jm7l9_gNJHDAD_w
 
```
 
#### 由于基于clusterrolebinding的clusterrole访问,所以我们可以看到所有的namespace我们都可以访问
 
![image-20220109154026312](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109154026312.png)
 
### 创建基于namespace的用户实践
 
```sh
[15:34:58 root@master1 security]#cat 08-security-dashboard-admin-ns.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
  name: def-ns-admin
  namespace: default
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  name: def-ns-admin
  namespace: default
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: admin
subjects:
- kind: ServiceAccount
  name: def-ns-admin
  namespace: default
[15:38:41 root@master1 security]#kubectl apply -f 08-security-dashboard-admin-ns.yaml
serviceaccount/def-ns-admin created
rolebinding.rbac.authorization.k8s.io/def-ns-admin created
[15:48:24 root@master1 security]#kubectl get secrets
NAME                       TYPE                                  DATA   AGE
build-robot-secret         kubernetes.io/service-account-token   3      6d19h
build-robot-token-rwfsb    kubernetes.io/service-account-token   3      6d19h
def-ns-admin-token-d2slz   kubernetes.io/service-account-token   3      2m32s
default-token-zjxfd        kubernetes.io/service-account-token   3      28d
[15:50:19 root@master1 security]#kubectl describe secret def-ns-admin-token-d2slz
Name:         def-ns-admin-token-d2slz
Namespace:    default
Labels:       <none>
Annotations:  kubernetes.io/service-account.name: def-ns-admin
              kubernetes.io/service-account.uid: 27b2577d-acb1-42ad-8022-4549632b7b21
 
Type:  kubernetes.io/service-account-token
 
Data
====
ca.crt:     1066 bytes
namespace:  7 bytes
token:      eyJhbGciOiJSUzI1NiIsImtpZCI6IjJIcTUtNjJ0d1NBYVppekdsUFR6bFF2NkhBN3ZPajZWREd3aDZlXzMtYk0ifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImRlZi1ucy1hZG1pbi10b2tlbi1kMnNseiIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50Lm5hbWUiOiJkZWYtbnMtYWRtaW4iLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC51aWQiOiIyN2IyNTc3ZC1hY2IxLTQyYWQtODAyMi00NTQ5NjMyYjdiMjEiLCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6ZGVmYXVsdDpkZWYtbnMtYWRtaW4ifQ.Wpyy-jEdXlwI95-wHbHwJL0hrTinktG4tZMT5dt9sDSR_eGs8fRTMK5FXz2BbwUslPbEDB6A58WTirQK40-HckrHeLshhHzuOu-T3MqDMdESRFrbfauXcQOf5FEGY1sFFX5aCO4YM17A6HBK3_m9t5plRzqdFqLVeT-BjWvyDtrZgl6eEGKLulPjlMPDDxkAGf6kN33t-XI3IRJ114aZvPsEEUakhwwrz9ymOFv_xQPNoZjRtQgYYH9oVkbdiKl9gzzyUTtA6sVDmmcfegtpOcwZTTuUoycVV1kcqeoUN2a9rcdHuBRI5Uy2jDZt7piSrCWXdtZmFsKA3S514_-8NA
 
```
 
尝试用这个新的token访问dashboard,只有default的namespace可以访问
 
![image-20220109155158601](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109155158601.png)
 
### 基于文件方式的认证(clusterrolebinding)
 
##### 集群设置
 
```sh
[16:01:39 root@master1 security]#kubectl config set-cluster kubernetes --certificate-authority=/etc/kubernetes/pki/ca.crt --server="https://10.0.0.50:6443" --embed-certs=true --kubeconfig=/root/kubeadmin.conf
Cluster "kubernetes" set.
[16:05:12 root@master1 security]#kubectl config view --kubeconfig=/root/kubeadmin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts: null
current-context: ""
kind: Config
preferences: {}
users: null
 
```
 
##### 用户配置
 
```sh
[16:05:27 root@master1 security]#kubectl get secrets -n kube-system | grep admin-token
dashboard-admin-token-nkqkv                      kubernetes.io/service-account-token   3      34m
[16:06:03 root@master1 security]#kubectl get secrets dashboard-admin-token-nkqkv -n kube-system -o jsonpath='{.data.token}' | base64 -d
eyJhbGciOiJSUzI1NiIsImtpZCI6IjJIcTUtNjJ0d1NBYVppekdsUFR6bFF2NkhBN3ZPajZWREd3aDZlXzMtYk0ifQ.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.d9JwS3W46tTneUnW2dy-FJcPXa22hhsk9H2f6htyP-NPAxRNpGt5bDiOAFHUVqgClRzG0BptzZvIwTFRCRgJkEK6Y3tihNXBBV-t4mSEY02bLmScOeZaO4m5DQXNVBTfEKpT7HYJqObHnyEdqmPpP2cOvQkKqrYwqDJnczkyhIA4Z-ZfYd7ep-cOYTnLQVM3dGKx0rTL9yRnlVnynHLUxYHLg0M7nbDYvtYo5A27BwlCXhxGL_ulB7UCkE6RUlrsaX6ZSuiA9eH4J38jesC1lYKdBpTRMNl6Bmh6N82LoUd1pb9Qgd6wE_BZA25P0TFyl_b-EL9Jm7l9_gNJHDAD_w
 
[16:15:29 root@master1 security]#KUBENETES_DASHBOARD=$(kubectl get secrets dashboard-admin-token-nkqkv -n kube-system -o jsonpath='{.data.token}' | base64 -d)
[16:15:51 root@master1 security]#kubectl config set-credentials kubeadmin --token=$KUBENETES_DASHBOARD --kubeconfig=/root/kubeadmin.conf
User "kubeadmin" set.
[16:16:28 root@master1 security]#kubectl config view --kubeconfig=/root/kubeadmin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts: null
current-context: ""
kind: Config
preferences: {}
users:
- name: kubeadmin
  user:
    token: REDACTED
 
```
 
##### 上下文配置
 
```sh
[16:17:31 root@master1 security]#kubectl config set-context kubeadmin@kubernetes --cluster=kubernetes --user=kubeadmin --kubeconfig=/root/kubeadmin.conf
Context "kubeadmin@kubernetes" created.
[16:20:57 root@master1 security]#kubectl config view --kubeconfig=/root/kubeadmin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts:
- context:
    cluster: kubernetes
    user: kubeadmin
  name: kubeadmin@kubernetes
current-context: ""
kind: Config
preferences: {}
users:
- name: kubeadmin
  user:
    token: REDACTED
     
[16:25:10 root@master1 ~]#kubectl config use-context kubeadmin@kubernetes --kubeconfig=/root/kubeadmin.conf
Switched to context "kubeadmin@kubernetes".
[16:25:33 root@master1 ~]#kubectl config view --kubeconfig=/root/kubeadmin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts:
- context:
    cluster: kubernetes
    user: kubeadmin
  name: kubeadmin@kubernetes
current-context: kubeadmin@kubernetes
kind: Config
preferences: {}
users:
- name: kubeadmin
  user:
    token: REDACTED
[16:25:50 root@master1 ~]#kubectl get sa --kubeconfig=/root/kubeadmin.conf
NAME           SECRETS   AGE
build-robot    1         6d20h
def-ns-admin   1         38m
default        1         28d
 
```
 
##### 登录测试
 
```sh
# 下载kubeadmin.conf,在浏览器测试
[16:26:22 root@master1 ~]#sz kubeadmin.conf
```
 
![image-20220109162839217](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109162839217.png)
 
![image-20220109162854077](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109162854077.png)
 
 
 
### 基于文件方式的认证(单用户)
 
##### 集群设置
 
```sh
[16:32:18 root@master1 ~]#kubectl config set-cluster kubernetes --certificate-authority=/etc/kubernetes/pki/ca.crt --server="https://10.0.0.50:6443" --embed-certs=true --kubeconfig=/root/def-ns-admin.conf
Cluster "kubernetes" set.
[16:32:44 root@master1 ~]#kubectl config view --kubeconfig=/root/def-ns-admin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts: null
current-context: ""
kind: Config
preferences: {}
users: null
 
```
 
 
 
##### 用户配置
 
```sh
[16:32:58 root@master1 ~]#kubectl get secrets
NAME                       TYPE                                  DATA   AGE
build-robot-secret         kubernetes.io/service-account-token   3      6d20h
build-robot-token-rwfsb    kubernetes.io/service-account-token   3      6d20h
def-ns-admin-token-d2slz   kubernetes.io/service-account-token   3      47m
default-token-zjxfd        kubernetes.io/service-account-token   3      28d
[16:34:52 root@master1 ~]#kubectl describe secret def-ns-admin-token-d2slz
Name:         def-ns-admin-token-d2slz
Namespace:    default
Labels:       <none>
Annotations:  kubernetes.io/service-account.name: def-ns-admin
              kubernetes.io/service-account.uid: 27b2577d-acb1-42ad-8022-4549632b7b21
 
Type:  kubernetes.io/service-account-token
 
Data
====
ca.crt:     1066 bytes
namespace:  7 bytes
token:      eyJhbGciOiJSUzI1NiIsImtpZCI6IjJIcTUtNjJ0d1NBYVppekdsUFR6bFF2NkhBN3ZPajZWREd3aDZlXzMtYk0ifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImRlZi1ucy1hZG1pbi10b2tlbi1kMnNseiIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50Lm5hbWUiOiJkZWYtbnMtYWRtaW4iLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC51aWQiOiIyN2IyNTc3ZC1hY2IxLTQyYWQtODAyMi00NTQ5NjMyYjdiMjEiLCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6ZGVmYXVsdDpkZWYtbnMtYWRtaW4ifQ.Wpyy-jEdXlwI95-wHbHwJL0hrTinktG4tZMT5dt9sDSR_eGs8fRTMK5FXz2BbwUslPbEDB6A58WTirQK40-HckrHeLshhHzuOu-T3MqDMdESRFrbfauXcQOf5FEGY1sFFX5aCO4YM17A6HBK3_m9t5plRzqdFqLVeT-BjWvyDtrZgl6eEGKLulPjlMPDDxkAGf6kN33t-XI3IRJ114aZvPsEEUakhwwrz9ymOFv_xQPNoZjRtQgYYH9oVkbdiKl9gzzyUTtA6sVDmmcfegtpOcwZTTuUoycVV1kcqeoUN2a9rcdHuBRI5Uy2jDZt7piSrCWXdtZmFsKA3S514_-8NA
[16:35:03 root@master1 ~]#KUBENETES_DASHBOARD=$(kubectl get secrets def-ns-admin-token-d2slz -n kube-system -o jsonpath='{.data.token}' | base64 -d)
Error from server (NotFound): secrets "def-ns-admin-token-d2slz" not found
[16:35:29 root@master1 ~]#KUBENETES_DASHBOARD=$(kubectl get secrets def-ns-admin-token-d2slz -o jsonpath='{.data.token}' | base64 -d)
[16:35:47 root@master1 ~]#echo $KUBENETES_DASHBOARD
eyJhbGciOiJSUzI1NiIsImtpZCI6IjJIcTUtNjJ0d1NBYVppekdsUFR6bFF2NkhBN3ZPajZWREd3aDZlXzMtYk0ifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImRlZi1ucy1hZG1pbi10b2tlbi1kMnNseiIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50Lm5hbWUiOiJkZWYtbnMtYWRtaW4iLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC51aWQiOiIyN2IyNTc3ZC1hY2IxLTQyYWQtODAyMi00NTQ5NjMyYjdiMjEiLCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6ZGVmYXVsdDpkZWYtbnMtYWRtaW4ifQ.Wpyy-jEdXlwI95-wHbHwJL0hrTinktG4tZMT5dt9sDSR_eGs8fRTMK5FXz2BbwUslPbEDB6A58WTirQK40-HckrHeLshhHzuOu-T3MqDMdESRFrbfauXcQOf5FEGY1sFFX5aCO4YM17A6HBK3_m9t5plRzqdFqLVeT-BjWvyDtrZgl6eEGKLulPjlMPDDxkAGf6kN33t-XI3IRJ114aZvPsEEUakhwwrz9ymOFv_xQPNoZjRtQgYYH9oVkbdiKl9gzzyUTtA6sVDmmcfegtpOcwZTTuUoycVV1kcqeoUN2a9rcdHuBRI5Uy2jDZt7piSrCWXdtZmFsKA3S514_-8NA
[16:35:54 root@master1 ~]#kubectl config set-credentials def-ns-admin --token=$KUBENETES_DASHBOARD --kubeconfig=/root/def-ns-admin.conf
User "def-ns-admin" set.
[16:36:40 root@master1 ~]#kubectl config view --kubeconfig=/root/def-ns-admin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts: null
current-context: ""
kind: Config
preferences: {}
users:
- name: def-ns-admin
  user:
    token: REDACTED
 
```
 
##### 上下文配置
 
```sh
[16:36:49 root@master1 ~]#kubectl config set-context def-ns-admin@kubernetes --cluster=kubernetes --user=def-ns-admin --kubeconfig=/root/def-ns-admin.conf
Context "def-ns-admin@kubernetes" created.
[16:39:00 root@master1 ~]#kubectl config view --kubeconfig=/root/def-ns-admin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts:
- context:
    cluster: kubernetes
    user: def-ns-admin
  name: def-ns-admin@kubernetes
current-context: ""
kind: Config
preferences: {}
users:
- name: def-ns-admin
  user:
    token: REDACTED
[16:39:16 root@master1 ~]#kubectl config use-context def-ns-admin@kubernetes --kubeconfig=/root/def-ns-admin.conf
Switched to context "def-ns-admin@kubernetes".
[16:39:45 root@master1 ~]#kubectl config view --kubeconfig=/root/def-ns-admin.conf
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: DATA+OMITTED
    server: https://10.0.0.50:6443
  name: kubernetes
contexts:
- context:
    cluster: kubernetes
    user: def-ns-admin
  name: def-ns-admin@kubernetes
current-context: def-ns-admin@kubernetes
kind: Config
preferences: {}
users:
- name: def-ns-admin
  user:
    token: REDACTED
[16:39:47 root@master1 ~]#kubectl get sa --kubeconfig=/root/def-ns-admin.conf
NAME           SECRETS   AGE
build-robot    1         6d20h
def-ns-admin   1         52m
default        1         28d
 
```
 
##### 登录测试
 
```sh
[16:40:17 root@master1 ~]#sz def-ns-admin.conf
```
 
![image-20220109164048196](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109164048196.png)
 
![image-20220109164100839](C:\Users\Noise\AppData\Roaming\Typora\typora-user-images\image-20220109164100839.png)

  

posted @   每天都在学习的自己  阅读(246)  评论(0编辑  收藏  举报
相关博文:
阅读排行:
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· AI编程工具终极对决:字节Trae VS Cursor,谁才是开发者新宠?
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南
· 被坑几百块钱后,我竟然真的恢复了删除的微信聊天记录!
点击右上角即可分享
微信分享提示