System-Scope JWT
Once the installation process is done, the system is bootstrapped with a system-scope project. To act as cluster-admin, you will need a JWT.
The installation process will create a JWT and should be placed at /root
under the lightos-system-jwt
file:
cat lightos-system-jwt
Sample Output
root@rack03-server58:~ cat lightos-system-jwt
export LIGHTOS_JWT=eyJhbGciOiJSUzI1NiIsImtpZCI6InN5c3RlbTpyb290IiwidHlwIjoiSldUIn0.eyJhdWQiOiJMaWdodE9TIiwiZXhwIjoxNjc4MDkzMjA1LCJpYXQiOjE2NDY1NTcyMDUsImlzcyI6Ii9yb290L2xpZ2h0b3MtY2VydGlmaWNhdGVzL2NlcnQtbGItYWRtaW4ta2V5LnBlbSIsImp0aSI6ImU0blRUZm5vM2JwMXJiOWFHM0xBOVEiLCJuYmYiOjE2NDY1NTcyMDUsInJvbGVzIjpbInN5c3RlbTpjbHVzdGVyLWFkbWluIl0sInN1YiI6ImxpZ2h0b3MtY2xpZW50In0.f18zSVBT5Iw6ti1C6gDfv2iy6MBCtGVK6dUdnuw7f3JtZywmqYR_J8F2EtgEpXGStBJT11c9VTpOhPiq7N55ao3hKveH0ep6SqovEwjnknQ6UOwu9tuXmv-Hgc5QtQ5jZSy_r0qnoQyJ6tKl1k-3t41s__hYKwuqTOwVSO9sCUbrUhd0cl2O_ycWS-knqabLS4_KVi0G5UtDT5vOZN2F7JU-7Ml4o51pss_KvPsMAhzRpHtCvEdOpG_K_TLr31kNV8qoDfrWgIWr_6MmT2zxpXRT09scc2D6YKnxp6e4rfFsliKE9FgyPMntTUKdbUp1YA53vlVPzz5_VqSwKXcrng
The easiest way to use the lbcli command-line from one of the Lightbits servers is to add the JWT to the end of the /etc/lbcli/lbcli.yaml
file. This file is stored in any Lightbits server. You can use one of them to manage the server.
Example:
root@rack11-server93:~ cat /etc/lbcli/lbcli.yaml
output-format: human-readable
dial-timeout: 5s
command-timeout: 60s
insecure-skip-tls-verify: true
debug: false
api-version: 2
insecure-transport: false
endpoint: https://127.0.0.1:443
jwt: eyJhbGciOiJSUzI1NiIsImtpZCI6InN5c3RlbTpyb290IiwidHlwIjoiSldUIn0.eyJhdWQiOiJMaWdodE9TIiwiZXhwIjoxNjc4MDkzMjA1LCJpYXQiOjE2NDY1NTcyMDUsImlzcyI6Ii9yb290L2xpZ2h0b3MtY2VydGlmaWNhdGVzL2NlcnQtbGItYWRtaW4ta2V5LnBlbSIsImp0aSI6ImU0blRUZm5vM2JwMXJiOWFHM0xBOVEiLCJuYmYiOjE2NDY1NTcyMDUsInJvbGVzIjpbInN5c3RlbTpjbHVzdGVyLWFkbWluIl0sInN1YiI6ImxpZ2h0b3MtY2xpZW50In0.f18zSVBT5Iw6ti1C6gDfv2iy6MBCtGVK6dUdnuw7f3JtZywmqYR_J8F2EtgEpXGStBJT11c9VTpOhPiq7N55ao3hKveH0ep6SqovEwjnknQ6UOwu9tuXmv-Hgc5QtQ5jZSy_r0qnoQyJ6tKl1k-3t41s__hYKwuqTOwVSO9sCUbrUhd0cl2O_ycWS-knqabLS4_KVi0G5UtDT5vOZN2F7JU-7Ml4o51pss_KvPsMAhzRpHtCvEdOpG_K_TLr31kNV8qoDfrWgIWr_6MmT2zxpXRT09scc2D6YKnxp6e4rfFsliKE9FgyPMntTUKdbUp1YA53vlVPzz5_VqSwKXcrng
This JWT gives admin access to the cluster. Make sure to delete this file once it is complete or secure, and do not share the file with unauthorized users.
Was this page helpful?