Exercise 6.3: Working with ServiceAccounts
default 네임스페이스에 있는 Secret 확인
kubectl get secret모든 네임스페이스에 있는 Secret 확인
kubectl get secret -AServiceAccount 생성
cat <<EOF | kubectl create -f - apiVersion: v1 kind: ServiceAccount metadata: name: secret-access EOFServiceAccount 생성 확인
kubectl get sa secret-accessClusterRole 확인
kubectl get clusterrolesadmin 과 cluster-admin 를 비교
diff <(kubectl get clusterroles admin -o yaml) <(kubectl get clusterroles cluster-admin -o yaml) -yClusterRole 생성
cat <<EOF | kubectl create -f - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: secret-access rules: - apiGroups: - "" resources: - secrets verbs: - get - list EOFClusterRole 생성 확인
kubectl get clusterrole secret-accessRoleBinding 생성
cat <<EOF | kubectl create -f - apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: secret-access subjects: - kind: ServiceAccount name: secret-access roleRef: kind: ClusterRole name: secret-access apiGroup: rbac.authorization.k8s.io EOFRoleBinding 생성 확인
kubectl get rolebindings secret-accessPod 생성
cat <<EOF | kubectl create -f - apiVersion: v1 kind: Pod metadata: name: kubectl spec: containers: - name: kubectl image: bitnami/kubectl command: [ "sleep" ] args: [ "infinity" ] EOFdefault 네임스페이스에 있는 Secret 확인
kubectl exec -it kubectl -- kubectl get secretsPod에 부여된 ServiceAccount 확인
kubectl get pod kubectl -o yamlPod 삭제
kubectl delete pod kubectlPod 생성
cat <<EOF | kubectl create -f - apiVersion: v1 kind: Pod metadata: name: kubectl spec: serviceAccountName: secret-access containers: - name: kubectl image: bitnami/kubectl command: [ "sleep" ] args: [ "infinity" ] EOFPod에 부여된 ServiceAccount 확인
kubectl get pod kubectl -o yaml | grep -i serviceaccountdefault 네임스페이스에 있는 Secret 확인
kubectl exec -it kubectl -- kubectl get secretsPod에 부여된 토큰 확인
kubectl exec -it kubectl -- cat /var/run/secrets/kubernetes.io/serviceaccount/tokenhttps://jwt.io 에서 토큰 내용 확인
리소스 삭제
{ kubectl delete pod kubectl kubectl delete rolebindings secret-access kubectl delete clusterrole secret-access kubectl delete sa secret-access }
Last updated