tencent cloud

Feedback

Authorizing Tencent Cloud OPS Team for Troubleshooting

Last updated: 2023-05-22 10:15:09

    Tencent Cloud OPS team is not allowed to log in to your cluster for troubleshooting without your permission. If you need Tencent Cloud OPS team to assist in troubleshooting, please refer to the following steps to grant Tencent Cloud OPS team related permissions. You can cancel the permissions authorized to Tencent Cloud OPS team at any time.

    Grant permissions to Tencent Cloud though console

    1. Log in to the TKE console.
    2. On Cluster Management page, select the cluster where Tencent Cloud assistance is needed.
    3. On the cluster details page, select Authorization Management > Authorize Tencent Cloud OPS team.
    4. When configuring the cluster RBAC, select the operation permissions that you want to authorize to Tencent Cloud OPS team.
    5. After the configuration is completed, you can check the progress in My Tickets.
      Note:

      Tencent Cloud OPS team is not allowed to log in to your cluster for troubleshooting without your permission. If you need Tencent Cloud OPS team to assist in troubleshooting, you can grant Tencent Cloud OPS team related permissions. You can also cancel the permissions authorized to Tencent Cloud OPS team at any time.
      You can withdraw permissions authorized to Tencent Cloud OPS team by deleting relevant resources (ClusterRoleBinding/tkeopsaccount-ClusterRole, ServiceAccount/tkeopsaccount, and Sercet/tkeopsaccount-token-xxxx).

    Grant permissions to Tencent Cloud OPS team through Kubernetes API

    You can grant permissions to Tencent Cloud OPS team by creating the following Kubernetes resources.

    ServiceAccount: authorize Tencent Cloud OPS team to access cluster credential

    kind: ServiceAccount
    apiVersion: v1
    metadata:
      name: tkeopsaccount
      namespace: kube-system
      labels:
        cloud.tencent.com/tke-ops-account: tkeops
    

    ClusterRoleBinding/RoleBing: rules on granting Tencent Cloud OPS team permissions

    Note:

    1. Name and label should be created according to the following rule.
    2. roleRef can be replaced with the permissions you want to grant to Tencent Cloud OPS team.
    apiVersion: rbac.authorization.k8s.io/v1beta1
    kind: ClusterRoleBinding
    metadata:
      annotations:
        cloud.tencent.com/tke-ops-account: tkeops
      labels:
        cloud.tencent.com/tke-ops-account: tkeops
      name: tkeopsaccount-ClusterRole
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: tke:admin
    subjects:
    - kind: ServiceAccount
      name: tkeopsaccount
      namespace: kube-system
    

    (Optional) ClusterRole/Role: permissions authorized to Tencent Cloud OPS team

    If there is relevant ClusterRole/Role in the cluster, you can use ClusterRoleBinding/RoleBinding to associate. Policies will be created automatically if you authorize through console.

    apiVersion: rbac.authorization.k8s.io/v1beta1
    kind: ClusterRole
    metadata:
      labels:
        cloud.tencent.com/tke-rbac-generated: "true"
      name: tke:admin
    rules:
    - apiGroups:
      - '*'
      resources:
      - '*'
      verbs:
      - '*'
    - nonResourceURLs:
      - '*'
      verbs:
      - '*'
    
    

    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support