Deckhouse Virtualization Platform for bare metal
Create a user to access the cluster web interfaces:
Create on the master node the
user.yml
file containing the user account data and access rights:apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: project-admin-joe namespace: vms subjects: - kind: User name: admin@deckhouse.io # для users.deckhouse.io параметр .spec.email apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole # Роль пользователя name: d8:manage:all:admin apiGroup: rbac.authorization.k8s.io --- # section containing the parameters of the static user # version of the Deckhouse API apiVersion: deckhouse.io/v1 kind: User metadata: name: admin spec: # user e-mail email: admin@deckhouse.io # this is a hash of the password <GENERATED_PASSWORD>, generated now # generate your own or use it at your own risk (for testing purposes) # echo "<GENERATED_PASSWORD>" | htpasswd -BinC 10 "" | cut -d: -f2 | base64 -w0 # you might consider changing this password: <GENERATED_PASSWORD_HASH>
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: project-admin-joe namespace: vms subjects: - kind: User name: admin@deckhouse.io # для users.deckhouse.io параметр .spec.email apiGroup: rbac.authorization.k8s.io roleRef: kind: ClusterRole # Роль пользователя name: d8:manage:all:admin apiGroup: rbac.authorization.k8s.io --- # section containing the parameters of the static user # version of the Deckhouse API apiVersion: deckhouse.io/v1 kind: User metadata: name: admin spec: # user e-mail email: admin@deckhouse.io # this is a hash of the password <GENERATED_PASSWORD>, generated now # generate your own or use it at your own risk (for testing purposes) # echo "<GENERATED_PASSWORD>" | htpasswd -BinC 10 "" | cut -d: -f2 | base64 -w0 # you might consider changing this password: <GENERATED_PASSWORD_HASH>Apply it using the following command on the master node: