iam身份验证以及访问控制_如何将受限访问IAM用户添加到EKS群集

iam身份验证以及访问控制

介绍 (Introduction)

Elastic Kubernetes Service (EKS) is the fully managed Kubernetes service from AWS. It is deeply integrated with many AWS services, such as AWS Identity and Access Management (IAM) (for authentication to the cluster), Amazon CloudWatch (for logging), Auto Scaling Groups (for scaling worker nodes), and Amazon Virtual Private Cloud (VPC) (for networking). Many companies trust Amazon EKS to run their containerized workloads.

Elastic Kubernetes服务(EKS)是AWS的完全托管的Kubernetes服务。 它与许多AWS服务深度集成,例如AWS Identity and Access Management(IAM)(用于对集群进行身份验证),Amazon CloudWatch(用于日志记录),Auto Scaling Groups(用于扩展工作节点)和Amazon Virtual Private Cloud( VPC)(用于联网)。 许多公司信任Amazon EKS来运行其容器化工作负载。

EKS uses IAM to provide authentication to your Kubernetes cluster (via the aws eks get-token command, or the AWS IAM Authenticator for Kubernetes). For authorization it relies on native Kubernetes Role Based Access Control (RBAC). IAM is used for authentication to your EKS Cluster. And you can manage the permissions for interacting with your cluster’s Kubernetes API through the native Kubernetes RBAC system.

EKS使用IAM为您的Kubernetes集群提供身份验证(通过aws eks get-token eks aws eks get-token命令或适用于Kubernetes的AWS IAM Authenticator )。 对于授权,它依赖于本地Kubernetes基于角色的访问控制(RBAC) 。 IAM用于对EKS群集进行身份验证。 而且,您可以通过本地Kubernetes RBAC系统管理与群集的Kubernetes API交互的权限。

如何创建IAM用户 (How to create an IAM User)

Go to your AWS Console where you will find the IAM service listed under the “Security, Identity & Compliance” group. Inside the IAM dashboard click on the Users tab and click the “Add User” button.

转到您的AWS控制台 ,您将在其中找到“安全性,身份和合规性”组下列出的IAM服务 。 在IAM仪表板内,单击“用户”选项卡,然后单击“添加用户”按钮。

Create a new user and allow the user programmatic access by clicking on the "Programmatic access" checkbox. You do not need any particular permission for your user to access EKS. You can go ahead without selecting any permission.

创建一个新用户,并通过单击“程序访问”复选框来允许该用户以程序访问 。 您不需要用户的任何特殊权限即可访问EKS。 您无需选择任何权限即可继续操作。

After the user is created, you will have access to the user's Access Key ID and Secret Access Key. You will be required to use these keys in the next step.

创建用户后,您将有权访问用户的访问密钥ID秘密访问密钥 。 您将需要在下一步中使用这些键。

配置AWS CLI (Configure the AWS CLI)

Configuring your AWS CLI with a new user is as simple as running the aws configure command and providing the AWS Access Key ID and the AWS Secret Access Key. The Default region name and Default Output format are optional, though.

使用新用户配置AWS CLI就像运行aws configure命令并提供AWS Access Key IDAWS Secret Access Key 。 但是, Default region nameDefault Output format是可选的。

$ aws configure --profile eks-user
AWS Access Key ID [None]: AKIAI44QH8DHBEXAMPLE
AWS Secret Access Key [None]: je7MtGbClwBF/2Zp9Utk/h3yCo8nvbEXAMPLEKEY
Default region name [None]: us-east-1
Default output format [None]: text

Once configured you can test to see if the user is properly configured using the aws sts get-caller-identity command:

配置完成后,您可以使用aws sts get-caller-identity命令测试是否正确配置了用户:

$ aws sts get-caller-identity --profile eks-user

If the user is properly configured with the aws cli utility you should see a response like the one shown below:

如果使用aws cli实用程序正确配置了用户,您应该会看到如下所示的响应:

{"UserId": "AIDAX7JPBEM4A6FTJRTMB","Account": "123456789012","Arn": "arn:aws:iam::123456789012:user/eks-user"
}

为用户创建角色和RoleBinding (Creating a Role and RoleBinding for the user)

With your IAM user properly configured, you can go ahead and create a role for the user. This snippet of code creates a role named eks-user-role with a modest list permission to the pods resource in your cluster.

正确配置IAM用户后,您可以继续为该用户创建角色。 此代码段创建一个名为eks-user-role ,对集群中的pods资源具有适度的list权限。

kind: Role
metadata:name: eks-user-role
rules:
- apiGroups: [""]resources: ["pods"]verbs: ["list"]

Save the above snippet of code in a file and then apply the Role to your Kubernetes cluster:

将上述代码片段保存在文件中,然后apply Role应用于您的Kubernetes集群:

$ kubectl apply -f role.yaml

With the role configured you need to create a corresponding RoleBinding:

配置了角色后,您需要创建相应的RoleBinding:

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:name: eks-user-role-binding
subjects:
- kind: Username: eks-userapiGroup: rbac.authorization.k8s.io
roleRef:kind: Rolename: eks-user-roleapiGroup: rbac.authorization.k8s.io

Save the above snippet of code in a file and then apply the Role Binding to your Kubernetes cluster:

将上述代码片段保存在文件中,然后apply角色绑定应用于您的Kubernetes集群:

$ kubectl apply -f role-binding.yaml

将用户添加到aws-auth配置图 (Adding the user to the aws-auth configmap)

If you want to grant additional AWS users or roles the ability to interact with your EKS cluster, you must add the users/roles to the aws-auth ConfigMap within Kubernetes in the kube-system namespace.

如果要授予其他AWS用户或角色与EKS集群进行交互的能力,则必须将用户/角色添加到kube-system命名空间中Kubernetes中的aws-auth ConfigMap中。

You can do this by either editing it using the kubectl edit command:

您可以使用kubectl edit命令kubectl edit

$ kubectl edit configmap aws-auth -n kube-system

Or by importing the aws-auth ConfigMap and applying the changes:

或通过导入aws-auth ConfigMap并应用更改:

$ kubectl get configmap aws-auth -n kube-system -o yaml > aws-auth.yaml

Add the user under the mapUsers as an item in the aws-auth ConfigMap:

将用户添加到mapUsers下,作为aws-auth ConfigMap中的一项:

data:mapUsers: |- userarn: arn:aws:iam::123456789012:user/eks-userusername: eks-usergroups:- eks-role

If the user is properly configured you should be able to list pods in the Cluster:

如果正确配置了用户,则您应该能够在集群中列出Pod:

$ kubectl get pods --as eks-user

The --as flag impersonates the request to Kubernetes as the given user. You can use this flag to test permissions for any given user.

--as标志以给定用户身份向Kubernetes发出请求。 您可以使用此标志来测试任何给定用户的权限。

配置用户权限 (Configuring permissions for the user)

The role which you defined previously only had permission to list pods. The eks-user cannot access any other Kubernetes resources like Deployments, ConfigMaps, Events, Secrets, logs or even shell into a given pod.

您先前定义的角色仅具有列出窗格的权限。 eks eks-user无法访问任何其他Kubernetes资源,如Deployments,ConfigMap,Events,Secrets,日志甚至是shell到给定的pod中。

In a real-world scenario, you will need to provide permissions to a user to access the required resources. The below snippet of code provides access to resources such as events, pods, deployments, configmaps and secrets.

在实际情况下,您将需要向用户提供访问所需资源的权限。 下面的代码段提供对资源的访问,例如eventspodsdeploymentsconfigmapssecrets

rules:
- apiGroups: [""]resources: ["events"]verbs: ["get", "list", "watch"]
- apiGroups: [""]resources: ["pods", "pods/log", "pods/exec"]verbs: ["list", "get", "create", "update", "delete"]
- apiGroups: ["extensions", "apps"]resources: ["deployments"]verbs: ["list", "get", "create", "update", "delete"]
- apiGroups: [""]resources: ["configmaps"]verbs: ["list", "get", "create", "update", "delete"]
- apiGroups: [""]resources: ["secrets"]verbs: ["list", "get", "create", "update", "delete"]

Add the above permissions to the role.yaml file and apply the changes, using kubectl apply -f.

使用kubectl apply -f将以上权限添加到role.yaml文件并应用更改。

测试,测试和测试! (Test, test and test!)

Now go ahead and test to see if the permissions have been properly applied to the eks-user. You can test the same using the above mentioned --as USERNAME flag or set the eks-user as the default profile for the aws cli.

现在继续进行测试,以查看权限是否已正确地应用于eks-user 。 您可以使用上面提到的--as USERNAME标志进行测试,或者将--as USERNAME eks-user设置为aws cli的默认配置文件。

$ export AWS_PROFILE=eks-user

Once configured you can test to see if the user is properly configured using the aws sts get-caller-identity command:

配置完成后,您可以使用aws sts get-caller-identity命令测试用户是否配置正确:

$ aws sts get-caller-identity

You should see a response like the following, indicating the user is properly configured with your aws cli utility:

您应该看到类似以下的响应,表明已使用aws cli实用程序正确配置了用户:

{"UserId": "AIDAX7JPBEM4A6FTJRTMB","Account": "123456789012","Arn": "arn:aws:iam::123456789012:user/eks-user"
}

Test the permissions of the user with the below-mentioned commands.

使用以下命令测试用户的权限。

$ kubectl get pods
$ kubectl get secrets
$ kubectl get configmaps
$ kubectl get deployments
$ kubectl logs <pod-name>
$ kubectl exec -it <pod-name> sh
$ kubectl create configmap my-cm --from-literal=db_username=<USERNAME> --from-literal=db_host=<HOSTNAME>
$ kubectl create secret generic my-secret --from-literal=db_password=<SOME_STRONG_PASSWORD>

Simply put, the eks-user user should be able to perform all the actions specified in the verbs array for pods, secrets, configmaps, deployments, and events. You can read more about it here Kubernetes Authorization Overview.

简而言之, eks-user用户应该能够执行verbs数组中针对podssecretsconfigmapsdeploymentsevents所指定的所有动作。 您可以在此处阅读有关Kubernetes授权概述的更多信息。

是否可以 (Can-I or Not)

You can use auth can-i to check if you have permission to a resource. To see if you have the permission to get pods simply run:

您可以使用auth can-i来检查您是否有权使用资源。 要查看您是否有权获得吊舱,只需运行:

$ kubectl auth can-i get pods

The answer will be a simple yes or no. Amazing, isn’t it?

答案将是简单的yesno 。 太神奇了,不是吗?

Wanna check if you have cluster-admin permissions? Fire this:

想检查您是否具有cluster-admin权限? 触发此:

$ kubectl auth can-i "*" "*"

结语 (Wrap up)

EKS provides the Kubernetes control plane with the backend persistence layer. The Kubernetes API server and the master nodes are provisioned and scaled across various availability zones, resulting in high availability and eliminating a single point of failure. An AWS-managed Kubernetes cluster can withstand the loss of an availability zone.

EKS为​​Kubernetes控制平面提供了后端持久层。 Kubernetes API服务器和主节点在各种可用性区域中进行配置和扩展,从而实现了高可用性并消除了单点故障。 由AWS管理的Kubernetes集群可以承受可用性区域的丢失。

Access and authorization controls are critical for any security system. Kubernetes provides us with an awesome robust RBAC permission mechanism.

访问和授权控制对于任何安全系统都是至关重要的。 Kubernetes为我们提供了强大的RBAC许可机制。

Originally published at faizanbashir.me

最初发表在 faizanbashir.me

翻译自: https://www.freecodecamp.org/news/adding-limited-access-iam-user-to-eks-cluster/

iam身份验证以及访问控制

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/390685.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

一步一步构建自己的管理系统①

2019独角兽企业重金招聘Python工程师标准>>> 系统肯定要先选一个基础框架。 还算比较熟悉Spring. 就选Spring boot postgres mybatis. 前端用Angular. 开始搭开发环境&#xff0c;开在window上整的。 到时候再放到服务器上。 自己也去整了个小服务器&#xff0c;…

面向对象面向过程

1、面向语句&#xff1a; 直接写原生的sql语句&#xff0c;但是这样代码不容易维护。改一个方法会导致整个项目都要改动&#xff0c; 2、面向过程 定义一些函数&#xff0c;用的时候就调用不用就不调用。但是这也有解决不了的问题&#xff0c;如果要维护需要改动代码&#xff0…

python边玩边学_边听边学数据科学

python边玩边学Podcasts are a fun way to learn new stuff about the topics you like. Podcast hosts have to find a way to explain complex ideas in simple terms because no one would understand them otherwise &#x1f642; In this article I present a few episod…

react css多个变量_如何使用CSS变量和React上下文创建主题引擎

react css多个变量CSS variables are really cool. You can use them for a lot of things, like applying themes in your application with ease. CSS变量真的很棒。 您可以将它们用于很多事情&#xff0c;例如轻松地在应用程序中应用主题。 In this tutorial Ill show you …

vue 自定义 移动端筛选条件

1.创建组件 components/FilterBar/FilterBar.vue <template><div class"filterbar" :style"{top: top px}"><div class"container"><div class"row"><divclass"col":class"{selected: ind…

PSP

姓名&#xff1a;袁亚琴 日期&#xff1a;11月27日 教师&#xff1a;王建民 课程&#xff1a;PSP 项目计划日志&#xff1a; PSP Planning . Estimate Development . Analysis . Design Spec . Design Review . …

如何在Windows中打开和使用命令提示符

入门 (Getting started) Windows, MacOS and Linux have command line interfaces. Windows’ default command line is the command prompt. The command prompt allows users to use their computer without pointing and clicking with a mouse. Windows&#xff0c;MacOS和…

ACM-ICPC北京赛区2017网络同步赛H

http://hihocoder.com/contest/icpcbeijing2017/problem/8 预处理暴力枚举修改的点 #include <bits/stdc.h> using namespace std; const int maxn 159; const int inf 0x3f3f3f3f; int a[maxn][maxn]; int colsum[maxn][maxn]; int rowsum[maxn][maxn]; int dp[maxn];…

PPPOE拨号上网流程及密码窃取具体实现

楼主学生党一枚&#xff0c;最近研究netkeeper有些许心得。 关于netkeeper是调用windows的rasdial来进行上网的东西&#xff0c;网上已经有一大堆&#xff0c;我就不赘述了。 本文主要讲解rasdial的部分核心过程&#xff0c;以及我们可以利用它来干些什么。 netkeeper中rasdial…

leetcode 160. 相交链表(双指针)

给你两个单链表的头节点 headA 和 headB &#xff0c;请你找出并返回两个单链表相交的起始节点。如果两个链表没有交点&#xff0c;返回 null 。 图示两个链表在节点 c1 开始相交&#xff1a; 题目数据 保证 整个链式结构中不存在环。 注意&#xff0c;函数返回结果后&#…

android开发入门_Android开发入门

android开发入门Android is an open source, Linux-based mobile operating system. Android was developed by the Open Handset Alliance, which was lead by Google and featured contributions from many other companies.Android是基于Linux的开放源代码移动操作系统。 An…

新购阿里云服务器ECS创建之后无法ssh连接的问题处理

作者&#xff1a;13 GitHub&#xff1a;https://github.com/ZHENFENG13 版权声明&#xff1a;本文为原创文章&#xff0c;未经允许不得转载。 问题描述 由于原服务器将要到期&#xff0c;因此趁着阿里云搞促销活动重新购买了一台ECS服务器&#xff0c;但是在初始化并启动后却无…

数据下发非标准用户权限测试

与同事一起沟通了下MDM的Oracle权限部分: create user cx default tablespace cwbaseoe73 identified by Test6530 grant select,update,delete,insert on lcoe739999.lsbzdw to cx grant create table to cx alter user cx quota unlimited on cwbaseoe73 grant create sessio…

leetcode 474. 一和零(dp)

给你一个二进制字符串数组 strs 和两个整数 m 和 n 。 请你找出并返回 strs 的最大子集的大小&#xff0c;该子集中 最多 有 m 个 0 和 n 个 1 。 如果 x 的所有元素也是 y 的元素&#xff0c;集合 x 是集合 y 的 子集 。 示例 1&#xff1a; 输入&#xff1a;strs [“10”…

边缘计算 ai_在边缘探索AI!

边缘计算 ai介绍 (Introduction) What is Edge (or Fog) Computing?什么是边缘(或雾)计算&#xff1f; Gartner defines edge computing as: “a part of a distributed computing topology in which information processing is located close to the edge — where things a…

JavaScript中的全局变量介绍

Global variables are declared outside of a function for accessibility throughout the program, while local variables are stored within a function using var for use only within that function’s scope. If you declare a variable without using var, even if it’…

初识spring-boot

使用Spring或者SpringMVC的话依然有许多东西需要我们进行配置&#xff0c;这样不仅徒增工作量而且在跨平台部署时容易出问题。 使用Spring Boot可以让我们快速创建一个基于Spring的项目&#xff0c;而让这个Spring项目跑起来我们只需要很少的配置就可以了。Spring Boot主要有如…

leetcode 879. 盈利计划(dp)

这是我参与更文挑战的第9天 &#xff0c;活动详情查看更文挑战 题目 集团里有 n 名员工&#xff0c;他们可以完成各种各样的工作创造利润。 第 i 种工作会产生 profit[i] 的利润&#xff0c;它要求 group[i] 名成员共同参与。如果成员参与了其中一项工作&#xff0c;就不能…

区块链101:区块链的应用和用例是什么?

区块链技术是一场记录系统的革命。 比特币是历史上第一个永久的、分散的、全球性的、无信任的记录分类帐。自其发明以来&#xff0c;世界各地各行各业的企业家都开始明白这一发展的意义。 区块链技术的本质让人联想到疯狂&#xff0c;因为这个想法现在可以应用到任何值得信赖的…

java请求接口示例_用示例解释Java接口

java请求接口示例介面 (Interfaces) Interface in Java is a bit like the Class, but with a significant difference: an interface can only have method signatures, fields and default methods. Since Java 8, you can also create default methods. In the next block y…