1. apply下面的资源文件
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: test
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cluster-admin
subjects:
  - kind: ServiceAccount
    name: test
    namespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:
  name: test
  namespace: kube-system
  1. 执行下面命令(替换KUBE_API为实际)
JWT_TOKEN_KUBESYSTEM_DEFAULT=`kubectl get -n kube-system secret $(kubectl get serviceaccount -n kube-system test -o jsonpath='{.secrets[0].name}') -o jsonpath='{.data.token}' | base64 --decode`
KUBE_API=https://172.20.187.11:6443
  1. 请求
curl  $KUBE_API/apis/apps/v1/deployments  --header "Authorization: Bearer $JWT_TOKEN_KUBESYSTEM_DEFAULT" -k