关于kubernetes:24kubernetesk8s笔记-认证授权与准入控制四-RBAC访问控制

44次阅读

共计 12165 个字符,预计需要花费 31 分钟才能阅读完成。

RBAC 访问控制 ServiceAccount

前言:

在上一节曾经介绍过 RBAC 通过绑定受权 Users Accounts 失去不同作用域权限
这节对 Serviceaccount 进行绑定受权 因为 sa 权限是针对 Pod 的权限 命令行无奈间接验证 所以借助 dashbaortd 来验证

  • 首先在 help 中能够看到 有对 serviceaccount 的绑定
[root@k8s-master authfiles]# kubectl create rolebinding --help
...
Usage:
  kubectl create rolebinding NAME --clusterrole=NAME|--role=NAME [--user=username]
[--group=groupname] [--serviceaccount=namespace:serviceaccountname] [--dry-run=server|client|none]
[options]

示例 1: 部署 DashBoard 验证 ServiceAccount 权限

  • DashBoard 官网 URL

    https://kubernetes.io/zh/docs…

kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.2.0/aio/deploy/recommended.yaml

[root@k8s-master authfiles]# kubectl get pod -n kubernetes-dashboard
NAME                                         READY   STATUS    RESTARTS   AGE
dashboard-metrics-scraper-79c5968bdc-28h7g   1/1     Running   0          84s
kubernetes-dashboard-9f9799597-qj8jv         1/1     Running   0          84s

[root@k8s-master authfiles]# kubectl get svc -n kubernetes-dashboard
NAME                        TYPE        CLUSTER-IP      EXTERNAL-IP   PORT(S)    AGE
dashboard-metrics-scraper   ClusterIP   10.98.196.130   <none>        8000/TCP   91s
kubernetes-dashboard        ClusterIP   10.99.133.20    <none>        443/TCP    93s
  • 测试环境 这里应用比较简单的裸露形式 批改配置文件间接裸露 DashBoard 端口
[root@k8s-master authfiles]# vim recommended.yaml  
kind: Service
apiVersion: v1
metadata:
  labels:
    k8s-app: kubernetes-dashboard
  name: kubernetes-dashboard
  namespace: kubernetes-dashboard
spec:
  ports:
    - port: 443
      targetPort: 8443
  externalIPs:   #应用内部 IP 裸露 https
  - 192.168.54.171  
  selector:
    k8s-app: kubernetes-dashboard
  • 从新利用失效
[root@k8s-master authfiles]# kubectl apply -f  recommended.yaml
    
[root@k8s-master authfiles]# kubectl get svc -n kubernetes-dashboard
NAME                        TYPE        CLUSTER-IP      EXTERNAL-IP      PORT(S)    AGE
dashboard-metrics-scraper   ClusterIP   10.98.196.130   <none>           8000/TCP   5m7s
kubernetes-dashboard        ClusterIP   10.99.133.20    192.168.54.171   443/TCP    5m9s
  • 关上浏览器输出之前批改的地址


  • 这里登录用到的 token 就 Serviceaccount token 对 Serviceaccount 的受权不同决定了 dashboard 的操作权限

示例 2: 创立 serviceaccount 绑定 admin 并验证权限, 作用域为名称空间

  • User –> Rolebindig –>ClusterRole: 权限降级,serviceaccount dev-admin 对名称空间 dev 领有齐全权限
  • 创立 serviceaccount
[root@k8s-master PodControl]# kubectl create serviceaccount dev-admin -n dev
serviceaccount/dev-admin created
  • 对 serviceaccount 通过 rolebinding 绑定 admin
[root@k8s-master PodControl]# kubectl create  rolebinding dev-admin  -n dev --clusterrole=admin  --serviceaccount=dev:dev-admin
rolebinding.rbac.authorization.k8s.io/dev-admin created
[root@k8s-master PodControl]# kubectl get sa -n rolebinding
No resources found in rolebinding namespace.
[root@k8s-master PodControl]# kubectl get rolebinding  -n dev
NAME        ROLE                AGE
dev-admin   ClusterRole/admin   10s
  • 查看 serviceaccount 中 secrets 的 token
[root@k8s-master PodControl]# kubectl get secrets -n dev
NAME                    TYPE                                  DATA   AGE
admin-token-42gb9       kubernetes.io/service-account-token   3      5d6h
default-token-m5b9r     kubernetes.io/service-account-token   3      5d6h
dev-admin-token-zbt9z   kubernetes.io/service-account-token   3      26s
[root@k8s-master PodControl]# kubectl get secrets dev-admin-token-zbt9z -n dev  -o yaml
apiVersion: v1
data:
  ca.crt: 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
  namespace: ZGV2
  
  token: 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
...
  • 复制下面的 token 并通过 base64 - d 进行解密
[root@k8s-master PodControl]# echo ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNklqaDRia3BGTWtNeFYwRnRabXhQVG14c1YzWmhZM2xJUm5aaVJqbGFVbmhGU1hkSFNuUkdjMjFhZFVVaWZRLmV5SnBjM01pT2lKcmRXSmxjbTVsZEdWekwzTmxjblpwWTJWaFkyTnZkVzUwSWl3aWEzVmlaWEp1WlhSbGN5NXBieTl6WlhKMmFXTmxZV05qYjNWdWRDOXVZVzFsYzNCaFkyVWlPaUprWlhZaUxDSnJkV0psY201bGRHVnpMbWx2TDNObGNuWnBZMlZoWTJOdmRXNTBMM05sWTNKbGRDNXVZVzFsSWpvaVpHVjJMV0ZrYldsdUxYUnZhMlZ1TFhwaWREbDZJaXdpYTNWaVpYSnVaWFJsY3k1cGJ5OXpaWEoyYVdObFlXTmpiM1Z1ZEM5elpYSjJhV05sTFdGalkyOTFiblF1Ym1GdFpTSTZJbVJsZGkxaFpHMXBiaUlzSW10MVltVnlibVYwWlhNdWFXOHZjMlZ5ZG1salpXRmpZMjkxYm5RdmMyVnlkbWxqWlMxaFkyTnZkVzUwTG5WcFpDSTZJamczTXpRNFltRXdMV1F4TlRBdE5HSTNPQzA0WlRneUxXWTFZekUwTkdSak1qazNaU0lzSW5OMVlpSTZJbk41YzNSbGJUcHpaWEoyYVdObFlXTmpiM1Z1ZERwa1pYWTZaR1YyTFdGa2JXbHVJbjAubEFhWjhoWjNUc0JJakpBbEc0a24wb084bjhISmNJRWIwZTR0NS1Fa2YyMGlTZHdxalRubTM3Z0FkajhicGtucW1YZHRhY0dQajhPSmxLSGFGUHJmM19uQnhNa0NTWHBzblZwVTdqUGhHN19XYmZLcEdPbHRMWERQeFdwQVNqeWp1aXlkcGFnWURiQnBXTnRJVGJ2eDFWaGVLTHlYNjB3V0QxeGdZS1d4R2Q4Njc3YllsLU5WLXNuNTNEQVNyck9rcG1aZDJqMDhCMmpoNlNrWnJiblc3NU1MYjg3YVI3VGg0ZEpWbmtiVTlySDFLUFRZdVd6Y1pOUnBnV1VyN2NJTDUxcG43Z2VpeUZJaTJBOXlmVXpJaDRGRWhqOTVqWVdId0J1akQ3T3M1ZlZIYWdyT2lIU1RkM01udmlyUHltNG5Ya3Q2UmR0bS1EUUpad2lFT1VnWUdR | base64 -d

eyJhbGciOiJSUzI1NiIsImtpZCI6Ijh4bkpFMkMxV0FtZmxPTmxsV3ZhY3lIRnZiRjlaUnhFSXdHSnRGc21adUUifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZXYiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoiZGV2LWFkbWluLXRva2VuLXpidDl6Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQubmFtZSI6ImRldi1hZG1pbiIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50LnVpZCI6Ijg3MzQ4YmEwLWQxNTAtNGI3OC04ZTgyLWY1YzE0NGRjMjk3ZSIsInN1YiI6InN5c3RlbTpzZXJ2aWNlYWNjb3VudDpkZXY6ZGV2LWFkbWluIn0.lAaZ8hZ3TsBIjJAlG4kn0oO8n8HJcIEb0e4t5-Ekf20iSdwqjTnm37gAdj8bpknqmXdtacGPj8OJlKHaFPrf3_nBxMkCSXpsnVpU7jPhG7_WbfKpGOltLXDPxWpASjyjuiydpagYDbBpWNtITbvx1VheKLyX60wWD1xgYKWxGd8677bYl-NV-sn53DASrrOkpmZd2j08B2jh6SkZrbnW75MLb87aR7Th4dJVnkbU9rH1KPTYuWzcZNRpgWUr7cIL51pn7geiyFIi2A9yfUzIh4FEhj95jYWHwBujD7Os5fVHagrOiHSTd3MnvirPym4nXkt6Rdtm-DQJZwiEOUgYGQ

[root@k8s-master PodControl]# 
  • 权限验证 只对 dev 和 defualt 名称空间有权限

示例 3: 创立 serviceaccount 绑定 cluster-admin

  • 领有超级管理员权限 作用域为集群级别资源
  • 创立 serviceaccount
[root@k8s-master PodControl]# kubectl create serviceaccount cluster-admin -n kubernetes-dashboard
serviceaccount/cluster-admin created

#创立 clusterrolebinding 绑定 cluster-admin  集群级别资源 不须要指定名称空间
[root@k8s-master PodControl]# kubectl create clusterrolebinding sa-cluster-admin --clusterrole=cluster-admin --serviceaccount=kubernetes-dashboard:cluster-admin
clusterrolebinding.rbac.authorization.k8s.io/sa-cluster-admin created

[root@k8s-master PodControl]# kubectl get secrets -n kubernetes-dashboard
NAME                               TYPE                                  DATA   AGE
cluster-admin-token-nq8jq          kubernetes.io/service-account-token   3      29s
default-token-5rlqd                kubernetes.io/service-account-token   3      63m
kubernetes-dashboard-certs         Opaque                                0      63m
kubernetes-dashboard-csrf          Opaque                                1      63m
kubernetes-dashboard-key-holder    Opaque                                2      63m
kubernetes-dashboard-token-kdc57   kubernetes.io/service-account-token   3      63m
[root@k8s-master PodControl]# kubectl get secrets cluster-admin-token-nq8jq -n kubernetes-dashboard -o yaml
apiVersion: v1
data:
  ...
  token: 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

...
  • 应用 base64 对 token 解密
[root@k8s-master PodControl]# echo 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 |base64 -d

eyJhbGciOiJSUzI1NiIsImtpZCI6Ijh4bkpFMkMxV0FtZmxPTmxsV3ZhY3lIRnZiRjlaUnhFSXdHSnRGc21adUUifQ.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.ey6i9QBFW9QHeJnI4g-xTmiOR6f2RtETGbQl_klnbWZldQKlSaz1q_cEmBeJsEE8Pu02btu9Nx-0MJs_0dhO0752kP4LzhEu4LS3nx62CsA5khd1zygPH-z5IkwMWNcYzaP1mYGjfWbw962LGpvv8iMkG-88JlHZR9Q-r-yhD_32U4zURmWlJr5ITlyxoFz_18-XVm8iaGuVPkpFuNmewcH3ByerrFaSIfSWSP3CMFNb2UZQIJaok1QT7KhtVFfVTnmOzP8BNvqTaJKoAyJ4fKrxG8usgQfK2nKcbDg6lVEtZlrOGBYQLViXEH2idk9FiuAMtVHzTmALINe4u-p_6A

[root@k8s-master PodControl]# 
  • 登录 kubernetes-dashboard 领有集群权限

正文完
 0