1、生成訪問證書
grep 'client-certificate-data' ~/.kube/config | head -n 1 | awk '{print $2}' | base64 -d >> kubecfg.crt grep 'client-key-data' ~/.kube/config | head -n 1 | awk '{print $2}' | base64 -d >> kubecfg.key openssl pkcs12 -export -clcerts -inkey kubecfg.key -in kubecfg.crt -out kubecfg.p12 -name "kubernetes-client"
將生成的kubecfg.p12證書導入到Windows中,直接雙擊打開,下一步導入即可。
注意:導入完成后需重啟瀏覽器。
2、生成訪問Token
新建文件admin-user.yaml:
apiVersion: v1 kind: ServiceAccount metadata: name: admin-user namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: admin-user roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount name: admin-user namespace: kube-system
創建角色及綁定賬號
kubectl create -f admin-user.yaml
獲取Token
kubectl describe secret admin-user --namespace=kube-system
此次先記錄下生成的Token
3、部署kubernetes-dashboard
curl -o kubernetes-dashboard.yaml https://raw.githubusercontent.com/kubernetes/dashboard/master/aio/deploy/recommended/kubernetes-dashboard.yaml vi kubernetes-dashboard.yaml 修改image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1為: image: mirrorgooglecontainers/kubernetes-dashboard-amd64:v1.10.1 kubectl apply -f kubernetes-dashboard.yaml
4、訪問
https://192.170.38.92:6443/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/
192.170.38.92為MasterIP,6443為apiserver-port
然后在登錄選項中選擇令牌登錄,復制進剛剛生成的令牌即可。
