繁体   English   中英

为 Terraform 服务帐户定义 ClusterRoleBinding

[英]Defining a ClusterRoleBinding for Terraform service account

因此,我在 GCP 云控制台中有一个 GCP 服务帐户,即Kube.netes AdminKube.netes Cluster Admin

我现在正在尝试为这个 terraform 服务帐户提供 GKE 中的ClusterRole角色,以通过以下 terraform 配置管理所有名称空间:

data "google_service_account" "terraform" {
  project    = var.project_id
  account_id = var.terraform_sa_email
}

# Terraform needs to manage cluster
resource "google_project_iam_member" "terraform-gke-admin" {
  project = var.project_id
  role    = "roles/container.admin"
  member  = "serviceAccount:${data.google_service_account.terraform.email}"
}

# Terraform needs to manage K8S RBAC
# https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control#iam-rolebinding-bootstrap
resource "kubernetes_cluster_role_binding" "terraform_clusteradmin" {
  depends_on = [
    google_project_iam_member.terraform-gke-admin,
  ]

  metadata {
    name = "cluster-admin-binding-terraform"
  }

  role_ref {
    api_group = "rbac.authorization.k8s.io"
    kind      = "ClusterRole"
    name      = "cluster-admin"
  }

  subject {
    api_group = "rbac.authorization.k8s.io"
    kind      = "User"
    name      = data.google_service_account.terraform.email
  }

  # must create a binding on unique ID of SA too
  subject {
    api_group = "rbac.authorization.k8s.io"
    kind      = "User"
    name      = data.google_service_account.terraform.unique_id
  }
}

但是,这总是返回以下错误:

Error: clusterrolebindings.rbac.authorization.k8s.io is forbidden: User "client" cannot create resource "clusterrolebindings" in API group "rbac.authorization.k8s.io" at the cluster scope
│ 
│   with module.kubernetes[0].kubernetes_cluster_role_binding.terraform_clusteradmin,
│   on kubernetes/terraform_role.tf line 15, in resource "kubernetes_cluster_role_binding" "terraform_clusteradmin":
│   15: resource "kubernetes_cluster_role_binding" "terraform_clusteradmin" {

任何想法这里出了什么问题? 这可能与使用 Google Groups RBAC 有关吗?

  authenticator_groups_config {
    security_group = "gke-security-groups@${var.acl_group_domain}"
  }
data "google_client_config" "provider" {}
provider "kubernetes" {
  cluster_ca_certificate = module.google.cluster_ca_certificate
  host                   = module.google.cluster_endpoint
  token                  = data.google_client_config.provider.access_token
}

暂无
暂无

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM