using kubectl and kops 1.8
When spinning of a cluster in aws using kops the client certificate (present as string in the client-certificate-data field of ~/.kube/config) created has the following values:
Subject: O=system:masters, CN=kubecfg
Unless I am wrong, starting from kubernetes 1.4, the value for Organitazion is interpeted as group information (string associated with CN value is the so-called user, since k8s does not inherently have such a concept)
1: How can I see what permissions are associated with the system:masters group and/or the kubecfg user?
- (related to the above): what is the out-of-the-box authorization method I am using now?
RBAC? How can I check this?
2: Why the entries in my ~/.kube/config do not incorporate a kubecfg user? (but rather a user bearing my cluster name and another user named admin?)
$ kubectl config view
apiVersion: v1
clusters:
- cluster:
certificate-authority-data: REDACTED
server: <server_url>
name: <my_cluster_name>
contexts:
- context:
cluster: <my_cluster_name>
user: <my_cluster_name>
name: <my_cluster_name>
current-context: <my_cluster_name>
kind: Config
preferences: {}
users:
- name: <my_cluster_name>
user:
client-certificate-data: REDACTED
client-key-data: REDACTED
password: <some_pass>
username: admin
- name: <my_cluster_name>.local-basic-auth
user:
password: <some_pass>
username: admin
At the end of the day, what user I am performing api calls with, when executing kubectl commands?
update: I tried to mess up the value of client-certificate-data in my ~/.kube/config and I got
error: tls: private key does not match public key
I am assuming this means I am using a x509 based auth (?)
So I am making api calls as kubecfg ?