首页 > 解决方案 > 为 Terraform 服务帐户定义 ClusterRoleBinding

问题描述

所以我有一个 GCP 服务帐户,Kubernetes Admin并且Kubernetes Cluster Admin在 GCP 云控制台中。

我现在正在尝试赋予这个 terraform 服务帐户ClusterRole在 GKE 中的角色,以通过以下 terraform 配置管理所有命名空间:

data "google_service_account" "terraform" {
  project    = var.project_id
  account_id = var.terraform_sa_email
}

# Terraform needs to manage cluster
resource "google_project_iam_member" "terraform-gke-admin" {
  project = var.project_id
  role    = "roles/container.admin"
  member  = "serviceAccount:${data.google_service_account.terraform.email}"
}

# Terraform needs to manage K8S RBAC
# https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control#iam-rolebinding-bootstrap
resource "kubernetes_cluster_role_binding" "terraform_clusteradmin" {
  depends_on = [
    google_project_iam_member.terraform-gke-admin,
  ]

  metadata {
    name = "cluster-admin-binding-terraform"
  }

  role_ref {
    api_group = "rbac.authorization.k8s.io"
    kind      = "ClusterRole"
    name      = "cluster-admin"
  }

  subject {
    api_group = "rbac.authorization.k8s.io"
    kind      = "User"
    name      = data.google_service_account.terraform.email
  }

  # must create a binding on unique ID of SA too
  subject {
    api_group = "rbac.authorization.k8s.io"
    kind      = "User"
    name      = data.google_service_account.terraform.unique_id
  }
}

但是,这总是返回以下错误:

Error: clusterrolebindings.rbac.authorization.k8s.io is forbidden: User "client" cannot create resource "clusterrolebindings" in API group "rbac.authorization.k8s.io" at the cluster scope
│ 
│   with module.kubernetes[0].kubernetes_cluster_role_binding.terraform_clusteradmin,
│   on kubernetes/terraform_role.tf line 15, in resource "kubernetes_cluster_role_binding" "terraform_clusteradmin":
│   15: resource "kubernetes_cluster_role_binding" "terraform_clusteradmin" {

任何想法这里出了什么问题?这可能与使用 Google Groups RBAC 有关吗?

  authenticator_groups_config {
    security_group = "gke-security-groups@${var.acl_group_domain}"
  }

标签: google-cloud-platformterraformgoogle-kubernetes-engine

解决方案


data "google_client_config" "provider" {}
provider "kubernetes" {
  cluster_ca_certificate = module.google.cluster_ca_certificate
  host                   = module.google.cluster_endpoint
  token                  = data.google_client_config.provider.access_token
}

推荐阅读