Merge pull request #24634 from tengqm/fix-24503
[zh] Translate configure-gmsa into Chinese
This commit is contained in:
commit
1996d94faa
|
@ -0,0 +1,494 @@
|
|||
---
|
||||
title: 为 Windows Pod 和容器配置 GMSA
|
||||
content_type: task
|
||||
weight: 20
|
||||
---
|
||||
<!--
|
||||
title: Configure GMSA for Windows Pods and containers
|
||||
content_type: task
|
||||
weight: 20
|
||||
-->
|
||||
<!-- overview -->
|
||||
|
||||
{{< feature-state for_k8s_version="v1.18" state="stable" >}}
|
||||
|
||||
<!--
|
||||
This page shows how to configure [Group Managed Service Accounts](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview) (GMSA) for Pods and containers that will run on Windows nodes. Group Managed Service Accounts are a specific type of Active Directory account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators across multiple servers.
|
||||
-->
|
||||
本页展示如何为将运行在 Windows 节点上的 Pod 和容器配置
|
||||
[组管理的服务账号(Group Managed Service Accounts,GMSA)](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview)。
|
||||
组管理的服务账号是活动目录(Active Directory)的一种特殊类型,提供自动化的
|
||||
密码管理、简化的服务主体名称(Service Principal Name,SPN)管理以及跨多个
|
||||
服务器将管理操作委派给其他管理员等能力。
|
||||
|
||||
<!--
|
||||
In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as Custom Resources. Windows Pods, as well as individual containers within a Pod, can be configured to use a GMSA for domain based functions (e.g. Kerberos authentication) when interacting with other Windows services. As of v1.16, the Docker runtime supports GMSA for Windows workloads.
|
||||
-->
|
||||
在 Kubernetes 环境中,GMSA 凭据规约配置为 Kubernetes 集群范围的自定义资源
|
||||
(Custom Resources)形式。Windows Pod 以及各 Pod 中的每个容器可以配置为
|
||||
使用 GMSA 来完成基于域(Domain)的操作(例如,Kerberos 身份认证),以便
|
||||
与其他 Windows 服务相交互。自 Kubernetes 1.16 版本起,Docker 运行时为
|
||||
Windows 负载支持 GMSA。
|
||||
|
||||
## {{% heading "prerequisites" %}}
|
||||
|
||||
<!--
|
||||
You need to have a Kubernetes cluster and the `kubectl` command-line tool must be configured to communicate with your cluster. The cluster is expected to have Windows worker nodes. This section covers a set of initial steps required once for each cluster:
|
||||
-->
|
||||
你需要一个 Kubernetes 集群,以及 `kubectl` 命令行工具,且工具必须已配置
|
||||
为能够与你的集群通信。集群预期包含 Windows 工作节点。
|
||||
本节讨论需要为每个集群执行一次的初始操作。
|
||||
|
||||
<!--
|
||||
### Install the GMSACredentialSpec CRD
|
||||
|
||||
A [CustomResourceDefinition](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/)(CRD) for GMSA credential spec resources needs to be configured on the cluster to define the custom resource type `GMSACredentialSpec`. Download the GMSA CRD [YAML](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/gmsa-crd.yml) and save it as gmsa-crd.yaml.
|
||||
Next, install the CRD with `kubectl apply -f gmsa-crd.yaml`
|
||||
-->
|
||||
### 安装 GMSACredentialSpec CRD
|
||||
|
||||
你需要在集群上配置一个用于 GMSA 凭据规约资源的
|
||||
[CustomResourceDefinition](/zh/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/)(CRD),
|
||||
以便定义类型为 `GMSACredentialSpec` 的自定义资源。
|
||||
首先下载 GMSA CRD [YAML](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/gmsa-crd.yml)
|
||||
并将其保存为 `gmsa-crd.yaml`。接下来执行 `kubectl apply -f gmsa-crd.yaml`
|
||||
安装 CRD。
|
||||
|
||||
<!--
|
||||
### Install webhooks to validate GMSA users
|
||||
Two webhooks need to be configured on the Kubernetes cluster to populate and validate GMSA credential spec references at the Pod or container level:
|
||||
|
||||
1. A mutating webhook that expands references to GMSAs (by name from a Pod specification) into the full credential spec in JSON form within the Pod spec.
|
||||
|
||||
1. A validating webhook ensures all references to GMSAs are authorized to be used by the Pod service account.
|
||||
-->
|
||||
### 安装 Webhook 来验证 GMSA 用户
|
||||
|
||||
你需要为 Kubernetes 集群配置两个 Webhook,在 Pod 或容器级别填充和检查
|
||||
GMSA 凭据规约引用。
|
||||
|
||||
1. 一个修改模式(Mutating)的 Webhook,将对 GMSA 的引用(在 Pod 规约中体现为名字)
|
||||
展开为完整凭据规约的 JSON 形式,并保存回 Pod 规约中。
|
||||
|
||||
1. 一个验证模式(Validating)的 Webhook,确保对 GMSA 的所有引用都是已经授权
|
||||
给 Pod 的服务账号使用的。
|
||||
|
||||
<!--
|
||||
Installing the above webhooks and associated objects require the steps below:
|
||||
|
||||
1. Create a certificate key pair (that will be used to allow the webhook container to communicate to the cluster)
|
||||
|
||||
1. Install a secret with the certificate from above.
|
||||
|
||||
1. Create a deployment for the core webhook logic.
|
||||
|
||||
1. Create the validating and mutating webhook configurations referring to the deployment.
|
||||
-->
|
||||
安装以上 Webhook 及其相关联的对象需要执行以下步骤:
|
||||
|
||||
1. 创建一个证书密钥对(用于允许 Webhook 容器与集群通信)
|
||||
|
||||
1. 安装一个包含如上证书的 Secret
|
||||
|
||||
1. 创建一个包含核心 Webhook 逻辑的 Deployment
|
||||
|
||||
1. 创建引用该 Deployment 的 Validating Webhook 和 Mutating Webhook 配置
|
||||
|
||||
<!--
|
||||
A [script](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/deploy-gmsa-webhook.sh) can be used to deploy and configure the GMSA webhooks and associated objects mentioned above. The script can be run with a `-dry-run=server` option to allow you to review the changes that would be made to your cluster.
|
||||
|
||||
The [YAML template](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/gmsa-webhook.yml.tpl) used by the script may also be used to deploy the webhooks and associated objects manually (with appropriate substitutions for the parameters)
|
||||
-->
|
||||
你可以使用[这个脚本](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/deploy-gmsa-webhook.sh)
|
||||
来部署和配置上述 GMSA Webhook 及相关联的对象。你还可以在运行脚本时设置 `--dry-run=server`
|
||||
选项以便审查脚本将会对集群做出的变更。
|
||||
|
||||
脚本所使用的[YAML 模板](https://github.com/kubernetes-sigs/windows-gmsa/blob/master/admission-webhook/deploy/gmsa-webhook.yml.tpl)
|
||||
也可用于手动部署 Webhook 及相关联的对象,不过需要对其中的参数作适当替换。
|
||||
|
||||
<!-- steps -->
|
||||
|
||||
<!--
|
||||
## Configure GMSAs and Windows nodes in Active Directory
|
||||
|
||||
Before Pods in Kubernetes can be configured to use GMSAs, the desired GMSAs need to be provisioned in Active Directory as described in the [Windows GMSA documentation](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#BKMK_Step1). Windows worker nodes (that are part of the Kubernetes cluster) need to be configured in Active Directory to access the secret credentials associated with the desired GMSA as described in the [Windows GMSA documentation](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#to-add-member-hosts-using-the-set-adserviceaccount-cmdlet)
|
||||
-->
|
||||
## 在活动目录中配置 GMSA 和 Windows 节点
|
||||
|
||||
在配置 Kubernetes 中的 Pod 以使用 GMSA 之前,需要按
|
||||
[Windows GMSA 文档](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#BKMK_Step1)
|
||||
中描述的那样先在活动目录中准备好期望的 GMSA。
|
||||
Windows 工作节点(作为 Kubernetes 集群的一部分)需要被配置到活动目录中,以便
|
||||
访问与期望的 GSMA 相关联的秘密凭据数据。这一操作的描述位于
|
||||
[Windows GMSA 文档](https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#to-add-member-hosts-using-the-set-adserviceaccount-cmdlet)
|
||||
中。
|
||||
|
||||
<!--
|
||||
## Create GMSA credential spec resources
|
||||
With the GMSACredentialSpec CRD installed (as described earlier), custom resources containing GMSA credential specs can be configured. The GMSA credential spec does not contain secret or sensitive data. It is information that a container runtime can use to describe the desired GMSA of a container to Windows. GMSA credential specs can be generated in YAML format with a utility [PowerShell script](https://github.com/kubernetes-sigs/windows-gmsa/tree/master/scripts/GenerateCredentialSpecResource.ps1).
|
||||
-->
|
||||
## 创建 GMSA 凭据规约资源
|
||||
|
||||
当(如前所述)安装了 GMSACredentialSpec CRD 之后,你就可以配置包含 GMSA 凭据
|
||||
规约的自定义资源了。GMSA 凭据规约中并不包含秘密或敏感数据。
|
||||
其中包含的信息主要用于容器运行时,便于后者向 Windows 描述容器所期望的 GMSA。
|
||||
GMSA 凭据规约可以使用
|
||||
[PowerShell 脚本](https://github.com/kubernetes-sigs/windows-gmsa/tree/master/scripts/GenerateCredentialSpecResource.ps1)
|
||||
以 YAML 格式生成。
|
||||
|
||||
<!--
|
||||
Following are the steps for generating a GMSA credential spec YAML manually in JSON format and then converting it:
|
||||
|
||||
1. Import the CredentialSpec [module](https://github.com/MicrosoftDocs/Virtualization-Documentation/blob/live/windows-server-container-tools/ServiceAccounts/CredentialSpec.psm1): `ipmo CredentialSpec.psm1`
|
||||
|
||||
1. Create a credential spec in JSON format using `New-CredentialSpec`. To create a GMSA credential spec named WebApp1, invoke `New-CredentialSpec -Name WebApp1 -AccountName WebApp1 -Domain $(Get-ADDomain -Current LocalComputer)`
|
||||
|
||||
1. Use `Get-CredentialSpec` to show the path of the JSON file.
|
||||
|
||||
1. Convert the credspec file from JSON to YAML format and apply the necessary header fields `apiVersion`, `kind`, `metadata` and `credspec` to make it a GMSACredentialSpec custom resource that can be configured in Kubernetes.
|
||||
-->
|
||||
下面是手动以 JSON 格式生成 GMSA 凭据规约并对其进行 YAML 转换的步骤:
|
||||
|
||||
1. 导入 CredentialSpec [模块](https://github.com/MicrosoftDocs/Virtualization-Documentation/blob/live/windows-server-container-tools/ServiceAccounts/CredentialSpec.psm1): `ipmo CredentialSpec.psm1`
|
||||
|
||||
1. 使用 `New-CredentialSpec` 来创建一个 JSON 格式的凭据规约。
|
||||
要创建名为 `WebApp1` 的 GMSA 凭据规约,调用
|
||||
`New-CredentialSpec -Name WebApp1 -AccountName WebApp1 -Domain $(Get-ADDomain -Current LocalComputer)`。
|
||||
|
||||
1. 使用 `Get-CredentialSpec` 来显示 JSON 文件的路径。
|
||||
|
||||
1. 将凭据规约从 JSON 格式转换为 YAML 格式,并添加必要的头部字段
|
||||
`apiVersion`、`kind`、`metadata` 和 `credspec`,使其成为一个可以在
|
||||
Kubernetes 中配置的 GMSACredentialSpec 自定义资源。
|
||||
|
||||
<!--
|
||||
The following YAML configuration describes a GMSA credential spec named `gmsa-WebApp1`:
|
||||
|
||||
```yaml
|
||||
apiVersion: windows.k8s.io/v1alpha1
|
||||
kind: GMSACredentialSpec
|
||||
metadata:
|
||||
name: gmsa-WebApp1 #This is an arbitrary name but it will be used as a reference
|
||||
credspec:
|
||||
ActiveDirectoryConfig:
|
||||
GroupManagedServiceAccounts:
|
||||
- Name: WebApp1 #Username of the GMSA account
|
||||
Scope: CONTOSO #NETBIOS Domain Name
|
||||
- Name: WebApp1 #Username of the GMSA account
|
||||
Scope: contoso.com #DNS Domain Name
|
||||
CmsPlugins:
|
||||
- ActiveDirectory
|
||||
DomainJoinConfig:
|
||||
DnsName: contoso.com #DNS Domain Name
|
||||
DnsTreeName: contoso.com #DNS Domain Name Root
|
||||
Guid: 244818ae-87ac-4fcd-92ec-e79e5252348a #GUID
|
||||
MachineAccountName: WebApp1 #Username of the GMSA account
|
||||
NetBiosName: CONTOSO #NETBIOS Domain Name
|
||||
Sid: S-1-5-21-2126449477-2524075714-3094792973 #SID of GMSA
|
||||
```
|
||||
-->
|
||||
下面的 YAML 配置描述的是一个名为 `gmsa-WebApp1` 的 GMSA 凭据规约:
|
||||
|
||||
```yaml
|
||||
apiVersion: windows.k8s.io/v1alpha1
|
||||
kind: GMSACredentialSpec
|
||||
metadata:
|
||||
name: gmsa-WebApp1 # 这是随意起的一个名字,将用作引用
|
||||
credspec:
|
||||
ActiveDirectoryConfig:
|
||||
GroupManagedServiceAccounts:
|
||||
- Name: WebApp1 # GMSA 账号的用户名
|
||||
Scope: CONTOSO # NETBIOS 域名
|
||||
- Name: WebApp1 # GMSA 账号的用户名
|
||||
Scope: contoso.com # DNS 域名
|
||||
CmsPlugins:
|
||||
- ActiveDirectory
|
||||
DomainJoinConfig:
|
||||
DnsName: contoso.com # DNS 域名
|
||||
DnsTreeName: contoso.com # DNS 域名根
|
||||
Guid: 244818ae-87ac-4fcd-92ec-e79e5252348a # GUID
|
||||
MachineAccountName: WebApp1 # GMSA 账号的用户名
|
||||
NetBiosName: CONTOSO # NETBIOS 域名
|
||||
Sid: S-1-5-21-2126449477-2524075714-3094792973 # GMSA 的 SID
|
||||
```
|
||||
|
||||
<!--
|
||||
The above credential spec resource may be saved as `gmsa-Webapp1-credspec.yaml` and applied to the cluster using: `kubectl apply -f gmsa-Webapp1-credspec.yml`
|
||||
-->
|
||||
上面的凭据规约资源可以保存为 `gmsa-Webapp1-credspec.yaml`,之后使用
|
||||
`kubectl apply -f gmsa-Webapp1-credspec.yml` 应用到集群上。
|
||||
|
||||
<!--
|
||||
## Configure cluster role to enable RBAC on specific GMSA credential specs
|
||||
|
||||
A cluster role needs to be defined for each GMSA credential spec resource. This authorizes the `use` verb on a specific GMSA resource by a subject which is typically a service account. The following example shows a cluster role that authorizes usage of the `gmsa-WebApp1` credential spec from above. Save the file as gmsa-webapp1-role.yaml and apply using `kubectl apply -f gmsa-webapp1-role.yaml`
|
||||
-->
|
||||
## 配置集群角色以启用对特定 GMSA 凭据规约的 RBAC
|
||||
|
||||
你需要为每个 GMSA 凭据规约资源定义集群角色。
|
||||
该集群角色授权某主体(通常是一个服务账号)对特定的 GMSA 资源执行 `use` 动作。
|
||||
下面的示例显示的是一个集群角色,对前文创建的凭据规约 `gmsa-WebApp1` 执行鉴权。
|
||||
将此文件保存为 `gmsa-webapp1-role.yaml` 并执行 `kubectl apply -f gmsa-webapp1-role.yaml`。
|
||||
|
||||
<!--
|
||||
```yaml
|
||||
#Create the Role to read the credspec
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: webapp1-role
|
||||
rules:
|
||||
- apiGroups: ["windows.k8s.io"]
|
||||
resources: ["gmsacredentialspecs"]
|
||||
verbs: ["use"]
|
||||
resourceNames: ["gmsa-WebApp1"]
|
||||
```
|
||||
-->
|
||||
```yaml
|
||||
# 创建集群角色读取凭据规约
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: webapp1-role
|
||||
rules:
|
||||
- apiGroups: ["windows.k8s.io"]
|
||||
resources: ["gmsacredentialspecs"]
|
||||
verbs: ["use"]
|
||||
resourceNames: ["gmsa-WebApp1"]
|
||||
```
|
||||
|
||||
<!--
|
||||
## Assign role to service accounts to use specific GMSA credspecs
|
||||
A service account (that Pods will be configured with) needs to be bound to the cluster role create above. This authorizes the service account to use the desired GMSA credential spec resource. The following shows the default service account being bound to a cluster role `webapp1-role` to use `gmsa-WebApp1` credential spec resource created above.
|
||||
-->
|
||||
## 将角色指派给要使用特定 GMSA 凭据规约的服务账号
|
||||
|
||||
你需要将某个服务账号(Pod 配置所对应的那个)绑定到前文创建的集群角色上。
|
||||
这一绑定操作实际上授予该服务账号使用所指定的 GMSA 凭据规约资源的访问权限。
|
||||
下面显示的是一个绑定到集群角色 `webapp1-role` 上的 default 服务账号,使之
|
||||
能够使用前面所创建的 `gmsa-WebApp1` 凭据规约资源。
|
||||
|
||||
```yaml
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: allow-default-svc-account-read-on-gmsa-WebApp1
|
||||
namespace: default
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: default
|
||||
namespace: default
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: webapp1-role
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
```
|
||||
|
||||
<!--
|
||||
## Configure GMSA credential spec reference in Pod spec
|
||||
The Pod spec field `securityContext.windowsOptions.gmsaCredentialSpecName` is used to specify references to desired GMSA credential spec custom resources in Pod specs. This configures all containers in the Pod spec to use the specified GMSA. A sample Pod spec with the annotation populated to refer to `gmsa-WebApp1`:
|
||||
-->
|
||||
## 在 Pod 规约中配置 GMSA 凭据规约引用
|
||||
|
||||
Pod 规约字段 `securityContext.windowsOptions.gmsaCredentialSpecName` 可用来
|
||||
设置对指定 GMSA 凭据规约自定义资源的引用。
|
||||
设置此引用将会配置 Pod 中的所有容器使用所给的 GMSA。
|
||||
下面是一个 Pod 规约示例,其中包含了对 `gmsa-WebApp1` 凭据规约的引用:
|
||||
|
||||
```yaml
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
labels:
|
||||
run: with-creds
|
||||
name: with-creds
|
||||
namespace: default
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
run: with-creds
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
run: with-creds
|
||||
spec:
|
||||
securityContext:
|
||||
windowsOptions:
|
||||
gmsaCredentialSpecName: gmsa-webapp1
|
||||
containers:
|
||||
- image: mcr.microsoft.com/windows/servercore/iis:windowsservercore-ltsc2019
|
||||
imagePullPolicy: Always
|
||||
name: iis
|
||||
nodeSelector:
|
||||
kubernetes.io/os: windows
|
||||
```
|
||||
|
||||
<!--
|
||||
Individual containers in a Pod spec can also specify the desired GMSA credspec using a per-container `securityContext.windowsOptions.gmsaCredentialSpecName` field. For example:
|
||||
-->
|
||||
Pod 中的各个容器也可以使用对应容器的 `securityContext.windowsOptions.gmsaCredentialSpecName`
|
||||
字段来设置期望使用的 GMSA 凭据规约。
|
||||
例如:
|
||||
|
||||
```yaml
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
labels:
|
||||
run: with-creds
|
||||
name: with-creds
|
||||
namespace: default
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
run: with-creds
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
run: with-creds
|
||||
spec:
|
||||
containers:
|
||||
- image: mcr.microsoft.com/windows/servercore/iis:windowsservercore-ltsc2019
|
||||
imagePullPolicy: Always
|
||||
name: iis
|
||||
securityContext:
|
||||
windowsOptions:
|
||||
gmsaCredentialSpecName: gmsa-Webapp1
|
||||
nodeSelector:
|
||||
kubernetes.io/os: windows
|
||||
```
|
||||
|
||||
<!--
|
||||
As Pod specs with GMSA fields populated (as described above) are applied in a cluster, the following sequence of events take place:
|
||||
|
||||
1. The mutating webhook resolves and expands all references to GMSA credential spec resources to the contents of the GMSA credential spec.
|
||||
|
||||
1. The validating webhook ensures the service account associated with the Pod is authorized for the `use` verb on the specified GMSA credential spec.
|
||||
|
||||
1. The container runtime configures each Windows container with the specified GMSA credential spec so that the container can assume the identity of the GMSA in Active Directory and access services in the domain using that identity.
|
||||
-->
|
||||
当 Pod 规约中填充了 GMSA 相关字段(如上所述),在集群中应用 Pod 规约时会依次
|
||||
发生以下事件:
|
||||
|
||||
1. Mutating Webhook 解析对 GMSA 凭据规约资源的引用,并将其全部展开,
|
||||
得到 GMSA 凭据规约的实际内容。
|
||||
|
||||
1. Validating Webhook 确保与 Pod 相关联的服务账号有权在所给的 GMSA 凭据规约
|
||||
上执行 `use` 动作。
|
||||
|
||||
1. 容器运行时为每个 Windows 容器配置所指定的 GMSA 凭据规约,这样容器就可以以
|
||||
活动目录中该 GMSA 所代表的身份来执行操作,使用该身份来访问域中的服务。
|
||||
|
||||
<!--
|
||||
## Troubleshooting
|
||||
|
||||
If you are having difficulties getting GMSA to work in your environment, there are a few troubleshooting steps you can take.
|
||||
-->
|
||||
## 故障排查
|
||||
|
||||
如果在你的环境中配置 GMSA 时遇到了困难,你可以采取若干步骤来排查可能
|
||||
的故障。
|
||||
|
||||
<!--
|
||||
First, make sure the credspec has been passed to the Pod. To do this you will need to `exec` into one of your Pods and check the output of the `nltest.exe /parentdomain` command. In the example below the Pod did not get the credspec correctly:
|
||||
-->
|
||||
首先,确保凭据规约已经被传递到 Pod。要实现这点,你需要先通过 `exec` 进入到
|
||||
你的 Pod 之一,检查 `nltest.exe /parentdomain` 命令的输出。
|
||||
在下面的例子中,Pod 未能正确地获得凭据规约:
|
||||
|
||||
```shell
|
||||
kubectl exec -it iis-auth-7776966999-n5nzr powershell.exe
|
||||
|
||||
Windows PowerShell
|
||||
Copyright (C) Microsoft Corporation. All rights reserved.
|
||||
|
||||
PS C:\> nltest.exe /parentdomain
|
||||
Getting parent domain failed: Status = 1722 0x6ba RPC_S_SERVER_UNAVAILABLE
|
||||
PS C:\>
|
||||
```
|
||||
|
||||
<!--
|
||||
If your Pod did get the credspec correctly, then next check communication with the domain. First, from inside of your Pod, quickly do an nslookup to find the root of your domain.
|
||||
|
||||
This will tell us 3 things:
|
||||
|
||||
1. The Pod can reach the DC
|
||||
1. The DC can reach the Pod
|
||||
1. DNS is working correctly.
|
||||
-->
|
||||
如果 Pod 未能正确获得凭据规约,则下一步就要检查与域之间的通信。
|
||||
首先,从 Pod 内部快速执行一个 nslookup 操作,找到域根。
|
||||
|
||||
这一操作会告诉我们三件事情:
|
||||
|
||||
1. Pod 能否访问域控制器(DC)
|
||||
1. DC 能否访问 Pod
|
||||
1. DNS 是否正常工作
|
||||
|
||||
<!--
|
||||
If the DNS and communication test passes, next you will need to check if the Pod has established secure channel communication with the domain. To do this, again, `exec` into your Pod and run the `nltest.exe /query` command.
|
||||
-->
|
||||
如果 DNS 和通信测试通过,接下来你需要检查是否 Pod 已经与域之间建立了
|
||||
安全通信通道。要执行这一检查,你需要再次通过 `exec` 进入到你的 Pod 中
|
||||
并执行 `nltest.exe /query` 命令。
|
||||
|
||||
```shell
|
||||
PS C:\> nltest.exe /query
|
||||
I_NetLogonControl failed: Status = 1722 0x6ba RPC_S_SERVER_UNAVAILABLE
|
||||
```
|
||||
|
||||
<!--
|
||||
This tells us that for some reason, the Pod was unable to logon to the domain using the account specified in the credspec. You can try to repair the secure channel by running the `nltest.exe /sc_reset:domain.example` command.
|
||||
-->
|
||||
这一输出告诉我们,由于某些原因,Pod 无法使用凭据规约中的账号登录到域。
|
||||
你可以通过运行 `nltest.exe /sc_reset:domain.example` 命令尝试修复安全通道。
|
||||
|
||||
```shell
|
||||
PS C:\> nltest /sc_reset:domain.example
|
||||
Flags: 30 HAS_IP HAS_TIMESERV
|
||||
Trusted DC Name \\dc10.domain.example
|
||||
Trusted DC Connection Status Status = 0 0x0 NERR_Success
|
||||
The command completed successfully
|
||||
PS C:\>
|
||||
```
|
||||
|
||||
<!--
|
||||
If the above command corrects the error, you can automate the step by adding the following lifecycle hook to your Pod spec. If it did not correct the error, you will need to examine your credspec again and confirm that it is correct and complete.
|
||||
-->
|
||||
如果上述命令修复了错误,你就可以通过向你的 Pod 规约添加生命周期回调来将此操作
|
||||
自动化。如果上述命令未能奏效,你就需要再次检查凭据规约,以确保其数据时正确的
|
||||
而且是完整的。
|
||||
|
||||
```yaml
|
||||
image: registry.domain.example/iis-auth:1809v1
|
||||
lifecycle:
|
||||
postStart:
|
||||
exec:
|
||||
command: ["powershell.exe","-command","do { Restart-Service -Name netlogon } while ( $($Result = (nltest.exe /query); if ($Result -like '*0x0 NERR_Success*') {return $true} else {return $false}) -eq $false)"]
|
||||
imagePullPolicy: IfNotPresent
|
||||
```
|
||||
|
||||
<!--
|
||||
If you add the `lifecycle` section show above to your Pod spec, the Pod will execute the commands listed to restart the `netlogon` service until the `nltest.exe /query` command exits without error.
|
||||
-->
|
||||
如果你向你的 Pod 规约中添加如上所示的 `lifecycle` 节,则 Pod 会自动执行所
|
||||
列举的命令来重启 `netlogon` 服务,直到 `nltest.exe /query`
|
||||
命令返回时没有错误信息。
|
||||
|
||||
<!--
|
||||
## GMSA limitations
|
||||
When using the [ContainerD runtime for Windows](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#cri-containerd) accessing restricted network shares via the GMSA domain identity fails. The container will recieve the identity of and calls from `nltest.exe /query` will work. It is recommended to use the [Docker EE runtime](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#docker-ee) if access to network shares is required. The Windows Server team is working on resolving the issue in the Windows Kernel and will release a patch to resolve this issue in the future. Look for updates on the [Microsoft Windows Containers issue tracker](https://github.com/microsoft/Windows-Containers/issues/44).
|
||||
-->
|
||||
## GMSA 的局限
|
||||
|
||||
在使用 [Windows 版本的 ContainerD 运行时](/zh/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#cri-containerd)
|
||||
时,通过 GMSA 域身份标识访问受限制的网络共享资源时会出错。
|
||||
容器会收到身份标识且 `nltest.exe /query` 调用也能正常工作。
|
||||
当需要访问网络共享资源时,建议使用
|
||||
[Docker EE 运行时](/zh/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#docker-ee)。
|
||||
Windows Server 团队正在 Windows 内核中解决这一问题,并在将来发布解决此问题的补丁。
|
||||
你可以在 [Microsoft Windows Containers 问题跟踪列表](https://github.com/microsoft/Windows-Containers/issues/44)
|
||||
中查找这类更新。
|
||||
|
Loading…
Reference in New Issue