我有一个正在运行的EKS集群,并在默认名称空间中部署了web应用程序,现在我正在尝试使用k8s清单文件安装Jenkins。
以下是我部署的文件列表,当我试图在manage Jenkins - configure中配置Kubernetes云时,我无法验证测试连接。
注意:我正在尝试使用服务帐户方法配置Jenkins。
rbac.yaml
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: jenkins
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: jenkins
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["create","delete","get","list","patch","update","watch"]
- apiGroups: [""]
resources: ["pods/exec"]
verbs: ["create","delete","get","list","patch","update","watch"]
- apiGroups: [""]
resources: ["pods/log"]
verbs: ["get","list","watch"]
- apiGroups: [""]
resources: ["secrets"]
verbs: ["create","delete","get","list","patch","update"]
- apiGroups: [""]
resources: ["configmaps"]
verbs: ["create","delete","get","list","patch","update"]
- apiGroups: ["apps"]
resources: ["deployments"]
verbs: ["create","delete","get","list","patch","update"]
- apiGroups: [""]
resources: ["services"]
verbs: ["create","delete","get","list","patch","update"]
- apiGroups: [""]
resources: ["ingresses"]
verbs: ["create","delete","get","list","patch","update"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: jenkins
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: jenkins
subjects:
- kind: ServiceAccount
name: jenkins
namespace: jenkins

有人能帮帮我吗?
发布于 2021-06-17 19:22:27
要使服务帐户"system:serviceaccount:default:jenkins"有权访问命名空间jenkins中API组"“中的资源”pod“,请将您的RoleBinding更改为:
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: jenkins
namespace: jenkins
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: jenkins
subjects:
- kind: ServiceAccount
name: jenkins
namespace: default在应用RoleBinding后,您可以使用kubectl auth can-i命令来测试服务帐户是否有权执行所需的功能。
https://stackoverflow.com/questions/68018056
复制相似问题