Yaml:
---
kind: ServiceAccount
apiVersion: v1
metadata:
name: orchestration
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: orchestration
rules:
- apiGroups: ["*"]
resources: ["*"]
verbs: ["*"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: orchestration
roleRef:
kind: ClusterRole
name: orchestration
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
name: orchestration
namespace: default
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: orchestration-master
spec:
replicas: 1
template:
metadata:
labels:
app: orchestration
spec:
serviceAccountName: orchestration
containers:
- name: orchestration
image: joan38/orchestration:latest
ports:
- name: ui
containerPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: orchestration-ui
spec:
type: NodePort
selector:
app: orchestration
ports:
- name: http
protocol: TCP
port: 80
nodePort: 31010
targetPort: 8080kubectl exec -ti --namespace default myContainer bashcurl -k https://kubernetes.default.svc.cluster.local/api/v1Unauthorized为什么?我该怎么做?
发布于 2017-05-25 14:58:24
服务帐户的凭据在/var/run/secrets/kubernetes.io/serviceaccount上挂载。
curl https://kubernetes.default.svc.cluster.local/api/v1 \
--cacert /var/run/secrets/kubernetes.io/serviceaccount/ca.crt \
-H "Authorization: Bearer $(</var/run/secrets/kubernetes.io/serviceaccount/token)"https://stackoverflow.com/questions/44182766
复制相似问题