Kubernetes Dashboard - Internal error (500): Not enough data to create auth info structure
Kubernetes Dashboard - Internal error (500): Not enough data to create auth info structure
我有 Kubernetes,其中为我的用户定义了 ClusterRoles,并通过 (RoleBindings) 命名空间定义了权限。
我希望这些用户可以使用自定义权限访问 Kubernetes 仪表板。但是,当他们尝试使用 kubeconfig 选项登录时收到此消息:
"Internal error (500): Not enough data to create auth info structure."
https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md -- 本指南仅适用于创建 ADMIN 用户,不适用于具有自定义权限或没有权限的用户...(已编辑)
更新已解决:
你必须这样做:
- 为每个用户创建 ServiceAccount
apiVersion: v1
kind: ServiceAccount
metadata:
name: NAME-user
namespace: kubernetes-dashboard
- 调整添加此 SA 的 RoleBinding
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: PUT YOUR CR HERE
namespace: PUT YOUR NS HERE
subjects:
- kind: User
name: PUT YOUR CR HERE
apiGroup: 'rbac.authorization.k8s.io'
- kind: ServiceAccount
name: NAME-user
namespace: kubernetes-dashboard
roleRef:
kind: ClusterRole
name: PUT YOUR CR HERE
apiGroup: 'rbac.authorization.k8s.io'
- 获取令牌:
kubectl -n kubernetes-dashboard get secret $(kubectl -n kubernetes-dashboard get sa/NAME-user -o jsonpath="{.secrets[0].name}") -o go-template="{{.data.token | base64decode}}"
- 将令牌添加到您的 kubeconfig 文件中。您的知识库应该包含如下内容:
apiVersion: v1
clusters:
- cluster:
server: https://XXXX
name: kubernetes
contexts:
- context:
cluster: kubernetes
user: YOUR UER
name: kubernetes
current-context: "kubernetes"
kind: Config
preferences: {}
users:
- name: YOUR USER
user:
client-certificate-data: CODED
client-key-data: CODED
token: CODED ---> ADD TOKEN HERE
- 登录
我有 Kubernetes,其中为我的用户定义了 ClusterRoles,并通过 (RoleBindings) 命名空间定义了权限。 我希望这些用户可以使用自定义权限访问 Kubernetes 仪表板。但是,当他们尝试使用 kubeconfig 选项登录时收到此消息:
"Internal error (500): Not enough data to create auth info structure."
https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md -- 本指南仅适用于创建 ADMIN 用户,不适用于具有自定义权限或没有权限的用户...(已编辑)
更新已解决:
你必须这样做:
- 为每个用户创建 ServiceAccount
apiVersion: v1
kind: ServiceAccount
metadata:
name: NAME-user
namespace: kubernetes-dashboard
- 调整添加此 SA 的 RoleBinding
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: PUT YOUR CR HERE
namespace: PUT YOUR NS HERE
subjects:
- kind: User
name: PUT YOUR CR HERE
apiGroup: 'rbac.authorization.k8s.io'
- kind: ServiceAccount
name: NAME-user
namespace: kubernetes-dashboard
roleRef:
kind: ClusterRole
name: PUT YOUR CR HERE
apiGroup: 'rbac.authorization.k8s.io'
- 获取令牌:
kubectl -n kubernetes-dashboard get secret $(kubectl -n kubernetes-dashboard get sa/NAME-user -o jsonpath="{.secrets[0].name}") -o go-template="{{.data.token | base64decode}}"
- 将令牌添加到您的 kubeconfig 文件中。您的知识库应该包含如下内容:
apiVersion: v1
clusters:
- cluster:
server: https://XXXX
name: kubernetes
contexts:
- context:
cluster: kubernetes
user: YOUR UER
name: kubernetes
current-context: "kubernetes"
kind: Config
preferences: {}
users:
- name: YOUR USER
user:
client-certificate-data: CODED
client-key-data: CODED
token: CODED ---> ADD TOKEN HERE
- 登录