Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
李少辉-开发者
gitlab-foss
提交
cbfd30d9
G
gitlab-foss
项目概览
李少辉-开发者
/
gitlab-foss
通知
15
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
G
gitlab-foss
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
cbfd30d9
编写于
11月 29, 2018
作者:
T
Thong Kuah
提交者:
Evan Read
11月 29, 2018
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Document how to create service account with admin
上级
eb22c2b7
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
44 addition
and
9 deletion
+44
-9
doc/user/project/clusters/index.md
doc/user/project/clusters/index.md
+44
-9
未找到文件。
doc/user/project/clusters/index.md
浏览文件 @
cbfd30d9
...
...
@@ -92,13 +92,47 @@ To add an existing Kubernetes cluster to your project:
the
`ca.crt`
contents here.
-
**Token**
-
GitLab authenticates against Kubernetes using service tokens, which are
scoped to a particular
`namespace`
. If you don't have a service token yet,
you can follow the
[
Kubernetes documentation
](
https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
)
to create one. You can also view or create service tokens in the
[
Kubernetes dashboard
](
https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/
)
(under
**Config > Secrets**
).
**
The account that will issue the service token
must have admin privileges on the cluster.
**
scoped to a particular
`namespace`
.
**
The token used should belong to a service account with
[
`cluster-admin`
](
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
)
privileges.
**
To create this service account:
1. Create a `gitlab` service account in the `default` namespace:
```bash
kubectl create -f - <<EOF
apiVersion: v1
kind: ServiceAccount
metadata:
name: gitlab
namespace: default
EOF
```
1. Create a cluster role binding to give the `gitlab` service account
`cluster-admin` privileges:
```bash
kubectl create -f - <<EOF
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: gitlab-cluster-admin
subjects:
- kind: ServiceAccount
name: gitlab
namespace: default
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
EOF
```
NOTE: **Note:**
For GKE clusters, you will need the
`container.clusterRoleBindings.create` permission to create a cluster
role binding. You can follow the [Google Cloud
documentation](https://cloud.google.com/iam/docs/granting-changing-revoking-access)
to grant access.
- **Project namespace** (optional) - You don't have to fill it in; by leaving
it blank, GitLab will create one for you. Also:
- Each project should have a unique namespace.
...
...
@@ -142,8 +176,9 @@ Whether ABAC or RBAC is enabled, GitLab will create the necessary
service accounts and privileges in order to install and run
[
GitLab managed applications
](
#installing-applications
)
:
-
A
`gitlab`
service account with
`cluster-admin`
privileges will be created in the
`default`
namespace, which will be used by GitLab to manage the newly created cluster.
-
If GitLab is creating the cluster, a
`gitlab`
service account with
`cluster-admin`
privileges will be created in the
`default`
namespace,
which will be used by GitLab to manage the newly created cluster.
-
A project service account with
[
`edit`
privileges
](
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录