Skip to main content
Getting Started With Teleport 12 | Kubernetes Edition
Getting Started With Teleport 12 | Kubernetes Edition

Length: 14:35

Enroll a Kubernetes Cluster

This guide demonstrates how to enroll a Kubernetes cluster as a Teleport resource by deploying the Teleport Kubernetes Service on the Kubernetes cluster you want to protect.

In this scenario, the Teleport Kubernetes Service pod detects that it is running on Kubernetes and enrolls the Kubernetes cluster automatically. The following diagram provides a simplified overview of this deployment scenario with the Teleport Kubernetes Service running on the Kubernetes cluster:

Enroll a Kubernetes cluster

For information about other ways to enroll and discover Kubernetes clusters, see Registering Kubernetes Clusters with Teleport.

Prerequisites

  • Access to a running Teleport cluster, tctl admin tool, and tsh client tool, version >= 14.3.33.

    For Teleport Enterprise and Teleport Enterprise Cloud, you should use the Enterprise version of tctl. You can verify the tools you have installed by running the following commands:

    $ tctl version
    # Teleport Enterprise v14.3.33 go1.21

    $ tsh version
    # Teleport v14.3.33 go1.21

    You can download these tools by following the appropriate Installation instructions for your environment.

  • Kubernetes >= v1.17.0

  • Helm >= 3.4.2

    Verify that Helm and Kubernetes are installed and up to date.

    $ helm version
    # version.BuildInfo{Version:"v3.4.2"}

    $ kubectl version
    # Client Version: version.Info{Major:"1", Minor:"17+"}
    # Server Version: version.Info{Major:"1", Minor:"17+"}
  • To check that you can connect to your Teleport cluster, sign in with tsh login, then verify that you can run tctl commands using your current credentials. tctl is supported on macOS and Linux machines. For example:
    $ tsh login --proxy=teleport.example.com [email protected]
    $ tctl status
    # Cluster teleport.example.com
    # Version 14.3.33
    # CA pin sha256:abdc1245efgh5678abdc1245efgh5678abdc1245efgh5678abdc1245efgh5678
    If you can connect to the cluster and run the tctl status command, you can use your current credentials to run subsequent tctl commands from your workstation. If you host your own Teleport cluster, you can also run tctl commands on the computer that hosts the Teleport Auth Service for full permissions.

Step 1/3. Create RBAC resources

To authenticate to a Kubernetes cluster using Teleport, you must have a Teleport role that grants access to the Kubernetes cluster you plan to interact with.

In this step, we show you how to create a Teleport role called kube-access that enables a user to send requests to any Teleport-protected Kubernetes cluster as a member of the viewers group. The Teleport Kubernetes Service impersonates the viewers group when proxying requests from the user.

  1. Create a file called kube-access.yaml with the following content:

    kind: role
    metadata:
    name: kube-access
    version: v6
    spec:
    allow:
    kubernetes_labels:
    '*': '*'
    kubernetes_resources:
    - kind: 'pod'
    namespace: '*'
    name: '*'
    kubernetes_groups:
    - viewers
    deny: {}
  2. Apply your changes:

    $ tctl create -f kube-access.yaml
  3. Assign the kube-access role to your Teleport user by running the appropriate commands for your authentication provider:

    1. Retrieve your local user's configuration resource:

      $ tctl get users/$(tsh status -f json | jq -r '.active.username') > out.yaml
    2. Edit out.yaml, adding kube-access to the list of existing roles:

        roles:
      - access
      - auditor
      - editor
      + - kube-access
    3. Apply your changes:

      $ tctl create -f out.yaml
    4. Sign out of the Teleport cluster and sign in again to assume the new role.

While you have authorized the kube-access role to access Kubernetes clusters as a member of the viewers group, this group does not yet have permissions within its Kubernetes cluster. To assign these permissions, create a Kubernetes RoleBinding or ClusterRoleBindings that grants permission to the viewers group.

  1. Create a file called viewers-bind.yaml with the following contents:

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    name: viewers-crb
    subjects:
    - kind: Group
    # Bind the group "viewers" to the kubernetes_groups assigned in the "kube-access" role
    name: viewers
    apiGroup: rbac.authorization.k8s.io
    roleRef:
    kind: ClusterRole
    # "view" is a default ClusterRole that grants read-only access to resources
    # See: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
    name: view
    apiGroup: rbac.authorization.k8s.io
  2. Apply the ClusterRoleBinding with kubectl:

    $ kubectl apply -f viewers-bind.yaml

Your Teleport user now has permissions to assume membership in the viewers group when accessing your Kubernetes cluster, and the viewers group now has permissions to view resources in the cluster. The next step is to deploy the Teleport Kubernetes Service in the cluster to proxy user requests.

Step 2/3. Follow guided enrollment instructions

In this step, you will deploy the Teleport Kubernetes Service on your Kubernetes cluster by copying a script from the Teleport Web UI and running it on your terminal.

  1. Open the Teleport Web UI and sign in using your administrative account.

  2. Click Enroll New Resource.

  3. Type all or part of Kubernetes in the Search field to filter the resource types displayed, then click Kubernetes.

  4. Copy the command to add the teleport-agent chart repository and paste it in a terminal on your workstation.

  5. Type teleport-agent for namespace where you will deploy the Teleport Kubernetes Service and the display name to use when connecting to this cluster, then click Next.

    After you click Next, Teleport generates a script to configure and enroll the Kubernetes cluster as a resource in the Teleport cluster.

  6. Copy the command displayed in the Teleport Web UI and run it in your terminal.

    The Teleport Web UI displays "Successfully detected your new Kubernetes cluster" as confirmation that your cluster is enrolled. When you see this message, click Next to continue.

Step 3/3. Test Kubernetes access

Now that you have deployed the Teleport Kubernetes Service on your Kubernetes cluster and enrolled the cluster as a Teleport resource, confirm that you can access your Kubernetes cluster as a member of the viewers group.

If you followed the previous steps in this guide, the Set Up Access view populates the Kubernetes Groups field with viewers.

To set up and test access:

  1. Click Next.

  2. Specify the teleport-agent namespace, the Kubernetes viewers group from the previous step, and your Teleport user name.

  3. Copy and run the commands displayed in the Teleport Web UI to interact with the Kubernetes cluster and verify access through Teleport. Alternatively, run the commands shown below:

    Authenticate to your Teleport cluster:

    $ tsh login --proxy=teleport.example.com:443 --auth=local [email protected] teleport.example.com

    List Kubernetes clusters available for you to access:

    $ tsh kube ls

    Retrieve credentials to access your Kubernetes cluster:

    $ tsh kube login Kubernetes-cluster-name

    The Teleport Kubernetes Service proxies kubectl commands:

    $ kubectl get pods -n teleport-agent

    You should see the Teleport Kubernetes Service pod you deployed earlier:

    NAME               READY   STATUS    RESTARTS   AGE
    teleport-agent-0 1/1 Running 0 8m6s
  4. Click Finish.

Next steps

This guide demonstrated how to enroll a Kubernetes cluster by running the Teleport Kubernetes Service within the Kubernetes cluster.