-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing RBAC permissions for cnsmanager-sa #6
Comments
@owwweiha Can you check the service account for your cns-manager deployment? get-kubeconfig.sh script creates service account There's a different service account for cns-manager deployment itself(assuming you're using basicauth deployment) - https://github.com/vmware-samples/cloud-native-storage-self-service-manager/blob/main/deploy/basic-auth/deploy-template.yaml#L1 . This service account is bound to a ClusterRole which has all the necessary permissions. I'm not sure why you have a service account( |
Hi @gohilankit, thank you for your response. You're right...
I modified the kubeconfig to use the
Nevertheless, using the By the way, we're using TKGI. Maybe something is different here? E.g., the deployment uses the |
Closing this issue was a mistake, sorry! |
Any news on this? Would be great to use a valid kubeconfig file during installation process (deploy.sh + basicauth) without modifying it. Right now, fresh (and totally valid) kubeconfig with my admin user gives me:
|
Describe the bug
When using the get-kubeconfig.sh script, the created cnsmanager-sa lacks of some permissions:
Adding this to the ClusterRole makes the error messages disappear:
Reproduction steps
Expected behavior
All needed RBAC permissions should be included and it shouldn't be necessary to add some in addition to the scripts that create them.
Additional context
No response
The text was updated successfully, but these errors were encountered: