Self-managed k8s cluster
Step 1: Create a Service Account
cat <<EOF | kubectl apply -f -
apiVersion: v1
kind: ServiceAccount
metadata:
name: my-service-account
namespace: default
EOF
Step 2: Bind Cluster Admin Role to the Service Account
cat <<EOF | kubectl apply -f -
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: my-service-account-binding
subjects:
- kind: ServiceAccount
name: my-service-account
namespace: default
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
EOF
Step 3: Create a Permanent Token
cat <<EOF | kubectl apply -f -
apiVersion: v1
kind: Secret
metadata:
name: my-service-account-token
annotations:
kubernetes.io/service-account.name: my-service-account
type: kubernetes.io/service-account-token
EOF
Step 4: Retrieve the Token
kubectl get secret my-service-account-token -o jsonpath="{.data.token}" | base64 --decode
Updated 5 months ago