关于 Kubernetes 的搭建的账户的认证问题 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
aqua02
V2EX    Kubernetes

关于 Kubernetes 的搭建的账户的认证问题

  •  
  •   aqua02 2022-10-02 22:05:46 +08:00 2017 次点击
    这是一个创建于 1108 天前的主题,其中的信息可能已经有所发展或是发生改变。

    开启了一个api-server,如何具有权限访问这个服务

    开启api-server

    开启的api-server 脚本如下

    /root/k8s/kubernetes/server/bin/kube-apiserver \ --log-dir=/root/k8s/kubernetes/log/kube-apiserver \ --log-file=/root/k8s/kubernetes/log/kube-apiserver/log.log \ --logtostderr=true \ --allow-privileged=true \ --bind-address=0.0.0.0 \ --secure-port=6443 \ --advertise-address=192.168.123.78 \ --service-cluster-ip-range=10.96.0.0/12 \ --service-node-port-range=30000-32767 \ --etcd-servers=https://192.168.123.78:2379,https://192.168.123.79:2379,https://192.168.123.80:2379 \ --etcd-cafile=/root/certs/ca.pem \ --etcd-certfile=/root/certs/etcd.pem \ --etcd-keyfile=/root/certs/etcd-key.pem \ --tls-cert-file=/root/certs/api-server.pem \ --tls-private-key-file=/root/certs/api-server-key.pem \ --client-ca-file=/root/certs/ca.pem \ --kubelet-client-certificate=/root/certs/client.pem \ --kubelet-client-key=/root/certs/client-key.pem \ --service-account-key-file=/root/certs/api-server.pem \ --service-account-signing-key-file=/root/certs/api-server-key.pem \ --service-account-issuer=https://kubernetes.default.svc.cluster.local \ --kubelet-preferred-address-types=Hostname,InternalDNS,InternalIP,ExternalDNS,ExternalIP \ --authorization-mode=RBAC,Node \ --enable-bootstrap-token-auth=true \ --requestheader-client-ca-file=/root/certs/ca.pem \ --proxy-client-cert-file=/root/certs/proxy.pem \ --proxy-client-key-file=/root/certs/proxy-key.pem \ --requestheader-allowed-names="" \ --requestheader-group-headers=X-Remote-Group \ --requestheader-extra-headers-prefix=X-Remote-Extra- \ --requestheader-username-headers=X-Remote-User 

    尝试访问

    利用其中的 --kubelet-client-certificate--kubelet-client-key

    生成了一个config

    /root/k8s/kubernetes/server/bin/kubectl config set-cluster kubernetes --certificate-authority=/root/certs/ca.pem --embed-certs=true --server=https://192.168.123.78:6443 --kubecOnfig=/root/k8s/kubernetes/server/bin/admin.kubeconfig /root/k8s/kubernetes/server/bin/kubectl config set-credentials kubernetes-admin --client-certificate=/root/certs/client.pem --client-key=/root/certs/client-key.pem --embed-certs=true --kubecOnfig=/root/k8s/kubernetes/server/bin/admin.kubeconfig /root/k8s/kubernetes/server/bin/kubectl config set-context kubernetes-admin@kubernetes --cluster=kubernetes --user=kubernetes-admin --kubecOnfig=/root/k8s/kubernetes/server/bin/admin.kubeconfig /root/k8s/kubernetes/server/bin/kubectl config use-context kubernetes-admin@kubernetes --kubecOnfig=/root/k8s/kubernetes/server/bin/admin.kubeconfig 

    然后当我用admin.kubeconfig进行访问的时候,出现了 403 的问题 ./kubectl get cs --kubecOnfig=/root/k8s/kubernetes/server/bin/admin.kubeconfig -v=9

    <<<<<

    Response Body: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"forbidden: User \"system:anonymous\" cannot get path \"/api\"","reason":"Forbidden","details":{},"code":403} I1002 21:44:12.604038 227095 round_trippers.go:466] curl -v -XGET -H "Accept: application/json, */*" -H "User-Agent: kubectl/v1.25.2 (linux/amd64) kubernetes/5835544" 'https://192.168.123.78:6443/apis?timeout=32s' 

    有大佬知道是什么原因吗, 或者说一个新开的 API-SERVER 的所谓的管理员账号密码是在哪里= =,如何访问api-server

    3 条回复    2022-10-08 16:25:23 +08:00
    aqua02
        1
    aqua02  
    OP
       2022-10-02 23:57:48 +08:00
    解决了 如果通过证书访问的话 证书的 CN 一定要携带 system:xxx 之类的 恕我直言。真恶心
    plko345
        2
    plko345  
       2022-10-03 21:18:28 +08:00 via Android
    文档里 best practice 里写的很清楚了,说恶心不合适吧
    aqua02
        3
    aqua02  
    OP
       2022-10-08 16:25:23 +08:00
    @plko345 嗯,之前没看到。网上的教程资料太少了, 只有脚本,但没有说明为什么这么做
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     3032 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 26ms UTC 00:26 PVG 08:26 LAX 17:26 JFK 20:26
    Do have faith in what you're doing.
    ubao snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86