https://stackoverflow.com/questions/47126779/join-cluster-after-init-token-expired
openssl genrsa -out myuser.key 2048
openssl req -new -key myuser.key -out myuser.csr -subj "/CN=myuser/O=myorg"
openssl x509 -req -in myuser.csr -signkey myuser.key -out myuser.crt -days 365
- myuser.key
- myuser.crt
kubectl create namespace mynamespace
or
vi mynamespace.yaml
apiVersion: v1
kind: Namespace
metadata:
name: mynamespace
kubectl apply -f mynamespace.yaml
kubectl create group owners
kubectl create group developers
kubectl create group monitoring
kubectl create secret generic myuser-secret --from-file=myuser.key --from-file=myuser.crt
vi myrole.yaml
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
namespace: mynamespace
name: myrole
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list", "watch"]
kubectl apply -f myrole.yaml
vi rolebinding.yaml
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: myrolebinding
namespace: mynamespace
subjects:
- kind: User
name: myuser
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: Role
name: myrole
apiGroup: rbac.authorization.k8s.io
kubectl apply -f rolebinding.yaml
vi cluster-admin-binding.yaml
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: mynamespace-rolebinding
namespace: mynamespace
subjects:
- kind: User
name: myuser
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: Role
name: myrole
apiGroup: rbac.authorization.k8s.io
kubectl apply -f cluster-admin-binding.yaml