美文网首页
17Kubernetes——RBAC角色访问控制

17Kubernetes——RBAC角色访问控制

作者: 鸡蛋挂面 | 来源:发表于2021-06-18 15:16 被阅读0次
        **RBAC(Role-based access control)**——基于角色(Role)的访问控制,(RBAC)是一种基于组织中用户的角色来调节控制对计算机或网络资源的访问的方法。使用 **“rbac.authorization.k8s.io” API Group** 实现授权决策,允许管理员通过 Kubernetes API 动态配置策略。
    
        先来讲一个重要的名词,角色。什么是角色?角色是一组权限(增删改查)的集合,只要给指定的用户分配相对应的角色,这个用户就会有该权限。
    
        RBAC在K8s上的用途主要分为两大类:
    
        第一类是对pod资源的限制,保证在K8s上运行的pod服务具有相应的集群权限。比如gitlab-runner的pod需要拥有创建新的临时pod的权限,用来构建CI/CD自动化流水线
    
        第二类是对使用k8s的人员进行资源的访问控制。确保不同的人员对不同的命名空间有不同的权限,比如,只允许开发人员对指定的名称空间有查询指定资源的权限,允许运维人员对指定名称空间的资源有增删改查的权限。
    

    以下是在生产中比较实用的角色访问控制脚本:

    1.创建对指定namespace有所有权限的kube-config(namespace不存在)

    #!/bin/bash
    #
    # This Script based on  https://www.toutiao.com/i6942467217019666952/
    # K8s'RBAC doc:         https://kubernetes.io/docs/reference/access-authn-authz/rbac
    # Gitlab'CI/CD doc:     hhttps://docs.gitlab.com/ee/user/permissions.html#running-pipelines-on-protected-branches
    # Laster uptate:        2021年6月18日14点50分
    
    BASEDIR="$(dirname "$0")"
    folder="$BASEDIR/kube_config"
    
    echo -e "All namespaces is here: \n$(kubectl get ns|awk 'NR!=1{print $1}')"
    echo "endpoint server if local network you can use $(kubectl cluster-info |awk '/Kubernetes/{print $NF}')"
    
    namespace=$1
    endpoint=$(echo "$2" | sed -e 's,https\?://,,g')
    
    if [[ -z "$endpoint" || -z "$namespace" ]]; then
        echo "Use "$(basename "$0")" NAMESPACE ENDPOINT";
        exit 1;
    fi
    
    if ! kubectl get ns|awk 'NR!=1{print $1}'|grep -w "$namespace";then kubectl create ns "$namespace";else echo "namespace: $namespace was exist." ;exit 1;fi
    
    echo "---
    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: $namespace-user
      namespace: $namespace
    ---
    kind: Role
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-full-access
      namespace: $namespace
    rules:
    - apiGroups: ['', 'extensions', 'apps', 'metrics.k8s.io']
      resources: ['*']
      verbs: ['*']
    - apiGroups: ['batch']
      resources:
      - jobs
      - cronjobs
      verbs: ['*']
    ---
    kind: RoleBinding
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-view
      namespace: $namespace
    subjects:
    - kind: ServiceAccount
      name: $namespace-user
      namespace: $namespace
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: $namespace-user-full-access
    ---
    # https://kubernetes.io/zh/docs/concepts/policy/resource-quotas/
    apiVersion: v1
    kind: ResourceQuota
    metadata:
      name: $namespace-compute-resources
      namespace: $namespace
    spec:
      hard:
        pods: "10"
        services: "10"
        persistentvolumeclaims: "5"
        requests.cpu: "1"
        requests.memory: 2Gi
        limits.cpu: "2"
        limits.memory: 4Gi" | kubectl apply -f -
    kubectl -n $namespace describe quota $namespace-compute-resources
    mkdir -p $folder
    tokenName=$(kubectl get sa $namespace-user -n $namespace -o "jsonpath={.secrets[0].name}")
    token=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data.token}" | base64 --decode)
    certificate=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data['ca\.crt']}")
    
    echo "apiVersion: v1
    kind: Config
    preferences: {}
    clusters:
    - cluster:
        certificate-authority-data: $certificate
        server: https://$endpoint
      name: $namespace-cluster
    users:
    - name: $namespace-user
      user:
        as-user-extra: {}
        client-key-data: $certificate
        token: $token
    contexts:
    - context:
        cluster: $namespace-cluster
        namespace: $namespace
        user: $namespace-user
      name: $namespace
    current-context: $namespace" > $folder/$namespace.kube.conf
    

    2.创建对指定namespace有所有权限的kube-config(namespace已存在)

    #!/bin/bash
    
    
    BASEDIR="$(dirname "$0")"
    folder="$BASEDIR/kube_config"
    
    echo -e "All namespaces is here: \n$(kubectl get ns|awk 'NR!=1{print $1}')"
    echo "endpoint server if local network you can use $(kubectl cluster-info |awk '/Kubernetes/{print $NF}')"
    
    namespace=$1
    endpoint=$(echo "$2" | sed -e 's,https\?://,,g')
    
    if [[ -z "$endpoint" || -z "$namespace" ]]; then
        echo "Use "$(basename "$0")" NAMESPACE ENDPOINT";
        exit 1;
    fi
    
    
    echo "---
    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: $namespace-user
      namespace: $namespace
    ---
    kind: Role
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-full-access
      namespace: $namespace
    rules:
    - apiGroups: ['', 'extensions', 'apps', 'metrics.k8s.io']
      resources: ['*']
      verbs: ['*']
    - apiGroups: ['batch']
      resources:
      - jobs
      - cronjobs
      verbs: ['*']
    ---
    kind: RoleBinding
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-view
      namespace: $namespace
    subjects:
    - kind: ServiceAccount
      name: $namespace-user
      namespace: $namespace
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: $namespace-user-full-access" | kubectl apply -f -
    
    mkdir -p $folder
    tokenName=$(kubectl get sa $namespace-user -n $namespace -o "jsonpath={.secrets[0].name}")
    token=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data.token}" | base64 --decode)
    certificate=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data['ca\.crt']}")
    
    echo "apiVersion: v1
    kind: Config
    preferences: {}
    clusters:
    - cluster:
        certificate-authority-data: $certificate
        server: https://$endpoint
      name: $namespace-cluster
    users:
    - name: $namespace-user
      user:
        as-user-extra: {}
        client-key-data: $certificate
        token: $token
    contexts:
    - context:
        cluster: $namespace-cluster
        namespace: $namespace
        user: $namespace-user
      name: $namespace
    current-context: $namespace" > $folder/$namespace.kube.conf
    

    3.创建只读权限的(namespace已存在)

    #!/bin/bash
    
    
    BASEDIR="$(dirname "$0")"
    folder="$BASEDIR/kube_config"
    
    echo -e "All namespaces is here: \n$(kubectl get ns|awk 'NR!=1{print $1}')"
    echo "endpoint server if local network you can use $(kubectl cluster-info |awk '/Kubernetes/{print $NF}')"
    
    namespace=$1
    endpoint=$(echo "$2" | sed -e 's,https\?://,,g')
    
    if [[ -z "$endpoint" || -z "$namespace" ]]; then
        echo "Use "$(basename "$0")" NAMESPACE ENDPOINT";
        exit 1;
    fi
    
    
    echo "---
    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: $namespace-user-readonly
      namespace: $namespace
    ---
    kind: Role
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-readonly-access
      namespace: $namespace
    rules:
    - apiGroups: ['', 'extensions', 'apps', 'metrics.k8s.io']
      resources: ['pods', 'pods/log']
      verbs: ['get', 'list', 'watch']
    - apiGroups: ['batch']
      resources: ['jobs', 'cronjobs']
      verbs: ['get', 'list', 'watch']
    ---
    kind: RoleBinding
    apiVersion: rbac.authorization.k8s.io/v1beta1
    metadata:
      name: $namespace-user-view-readonly
      namespace: $namespace
    subjects:
    - kind: ServiceAccount
      name: $namespace-user-readonly
      namespace: $namespace
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: $namespace-user-readonly-access" | kubectl apply -f -
    
    mkdir -p $folder
    tokenName=$(kubectl get sa $namespace-user-readonly -n $namespace -o "jsonpath={.secrets[0].name}")
    token=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data.token}" | base64 --decode)
    certificate=$(kubectl get secret $tokenName -n $namespace -o "jsonpath={.data['ca\.crt']}")
    
    echo "apiVersion: v1
    kind: Config
    preferences: {}
    clusters:
    - cluster:
        certificate-authority-data: $certificate
        server: https://$endpoint
      name: $namespace-cluster-readonly
    users:
    - name: $namespace-user-readonly
      user:
        as-user-extra: {}
        client-key-data: $certificate
        token: $token
    contexts:
    - context:
        cluster: $namespace-cluster-readonly
        namespace: $namespace
        user: $namespace-user-readonly
      name: $namespace
    current-context: $namespace" > $folder/$namespace-readonly.kube.conf
    

    相关文章

      网友评论

          本文标题:17Kubernetes——RBAC角色访问控制

          本文链接:https://www.haomeiwen.com/subject/donkyltx.html