Prerequisites
This tutorial assumes the following:
You have created an Amazon EKS cluster by following the steps in Getting started with Amazon EKS.
You have the Kubernetes Metrics Server installed. For more information, see Installing the Kubernetes Metrics Server.
The security groups for your control plane elastic network interfaces and nodes follow the recommended settings in Amazon EKS security group considerations.
You are using a
kubectl
client that is configured to communicate with your Amazon EKS cluster.
Step 2: Deploy the Kubernetes dashboard
Complete the instructions for the option that corresponds to the Region that your cluster is in.
All Regions other than Beijing and Ningxia China
kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.5/aio/deploy/recommended.yaml
Beijing and Ningxia China
Download the Kubernetes Dashboard manifest with the following command.
curl -o recommended.yaml https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.5/aio/deploy/recommended.yaml
Edit the manifest files using the following steps.
View the manifest file or files that you downloaded and note the name of the image. Download the image locally with the following command.
docker pull image:<tag>
Tag the image to be pushed to an Amazon Elastic Container Registry repository in China with the following command.
docker tag image:<tag> <aws_account_id>.dkr.ecr.<cn-north-1>.amazonaws.com/image:<tag>
Push the image to a China Amazon ECR repository with the following command.
docker push image:<tag> <aws_account_id>.dkr.ecr.<cn-north-1>.amazonaws.com/image:<tag>
Update the Kubernetes manifest file or files to reference the Amazon ECR image URL in your Region.
Apply the manifest to your cluster with the following command.
kubectl apply -f recommended.yaml
Output:
namespace/kubernetes-dashboard created
serviceaccount/kubernetes-dashboard created
service/kubernetes-dashboard created
secret/kubernetes-dashboard-certs created
secret/kubernetes-dashboard-csrf created
secret/kubernetes-dashboard-key-holder created
configmap/kubernetes-dashboard-settings created
role.rbac.authorization.k8s.io/kubernetes-dashboard created
clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard created
rolebinding.rbac.authorization.k8s.io/kubernetes-dashboard created
clusterrolebinding.rbac.authorization.k8s.io/kubernetes-dashboard created
deployment.apps/kubernetes-dashboard created
service/dashboard-metrics-scraper created
deployment.apps/dashboard-metrics-scraper created
Step 3: Create an eks-admin
service account and cluster role binding
By default, the Kubernetes Dashboard user has limited permissions. In this section, you create an eks-admin
service account and cluster role binding that you can use to securely connect to the dashboard with admin-level permissions. For more information, see Managing Service Accounts
To create the eks-admin
service account and cluster role binding
The example service account created with this procedure has full cluster-admin
(superuser) privileges on the cluster. For more information, see Using RBAC authorization
Create a file called
eks-admin-service-account.yaml
with the text below. This manifest defines a service account and cluster role binding calledeks-admin
.apiVersion: v1 kind: ServiceAccount metadata: name: eks-admin namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: eks-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount name: eks-admin namespace: kube-system
Apply the service account and cluster role binding to your cluster.
kubectl apply -f eks-admin-service-account.yaml
Output:
serviceaccount "eks-admin" created clusterrolebinding.rbac.authorization.k8s.io "eks-admin" created
Step 4: Connect to the dashboard
Now that the Kubernetes Dashboard is deployed to your cluster, and you have an administrator service account that you can use to view and control your cluster, you can connect to the dashboard with that service account.
To connect to the Kubernetes dashboard
Retrieve an authentication token for the
eks-admin
service account. Copy the<authentication_token>
value from the output. You use this token to connect to the dashboard.kubectl -n kube-system describe secret $(kubectl -n kube-system get secret | grep eks-admin | awk '{print $1}')
Output:
Name: eks-admin-token-b5zv4 Namespace: kube-system Labels: <none> Annotations: kubernetes.io/service-account.name=eks-admin kubernetes.io/service-account.uid=bcfe66ac-39be-11e8-97e8-026dce96b6e8 Type: kubernetes.io/service-account-token Data ==== ca.crt: 1025 bytes namespace: 11 bytes token: <authentication_token>
COMMENTS