Release Notes
Announcements
Release Notes
kube-system namespace, create a ServiceAccount named apigw-ingress and a ClusterRole named apigw-ingress-clusterrole.apigw-ingress and apigw-ingress-clusterrole through ClusterRoleBinding. Then, the permission of the apigw-ingress ServiceAccount is obtained by API Gateway to access the API server of the cluster.apigw-ingress ServiceAccount is stored in the Secret prefixed with apigw-ingress-token-.apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRolemetadata:name: apigw-ingress-clusterrolerules:- apiGroups:- ""resources:- services- namespaces- endpoints- nodes- podsverbs:- get- list- watch- apiGroups:- appsresources:- deployments- replicasetsverbs:- get- list- watch- apiGroups:- ""resources:- configmaps- secretsverbs:- "*"- apiGroups:- extensionsresources:- ingresses- ingresses/statusverbs:- "*"- apiGroups:- ""resources:- eventsverbs:- create- patch- list- update- apiGroups:- apiextensions.k8s.ioresources:- customresourcedefinitionsverbs:- "*"- apiGroups:- cloud.tencent.comresources:- tkeserviceconfigsverbs:- "*"---apiVersion: v1kind: ServiceAccountmetadata:namespace: kube-systemname: apigw-ingress---apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRoleBindingmetadata:name: apigw-ingress-clusterrole-bindingroleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: apigw-ingress-clusterrolesubjects:- kind: ServiceAccountname: apigw-ingressnamespace: kube-system
apigw-ingress under the kube-system namespace.apigw-ingress-clusterrole under the kube-system namespace.apigw-ingress-clusterrole-binding under the kube-system namespace.apigw-ingress-token- in the kube-system namespace.Was this page helpful?
You can also Contact sales or Submit a Ticket for help.
Help us improve! Rate your documentation experience in 5 mins.
Feedback