-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Insufficient description in the doc regarding RBAC configuration #2581
Comments
My understanding is that I need to assign proper permission to access the resource |
Correct, you need to add permissions to access them by binding them to a service account(either Should add a new resource Hint: I use this a lot when checking if I was successful in binding new permissions correctly: https://stackoverflow.com/questions/54889458/kubernetes-check-serviceaccount-permissions |
Hi, @simster7 , I applied the following role yaml file
However, I am still getting the same error and seems not having the permission to get nodes/proxy
Did I miss any step? Thanks. |
Even I did a role binding as followings
The submited job still returns an error
|
Resource For testing you can use
but it should also work when you change the This is only necessary when using |
Hi,
And for non-testing purpose, what should we do ? Edit: I realised I haven't been very polite. Sorry. |
@h4wkmoon I use the following ClusterRole: apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: argo-executor
rules:
# pod get/watch is used to identify the container IDs of the current pod
# pod patch is used to annotate the step's outputs back to controller (e.g. artifact location)
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- watch
- patch
# logs get/watch are used to get the pods logs for script outputs, and for log archival
- apiGroups:
- ""
resources:
- pods/log
- nodes/proxy
verbs:
- get
- watch |
This doesnt work even after defining:
I'm still getting:
and error like:
Anything missing?? Could you please give any hints. Any way to force step pods to run on non default account? As I'm able to configure argo service account to have correct permissions but not the default...
Well, although I changed
So unfortunately there is still something missing... |
I am following the get-started tutorial to install the argo workflow 2.7.
The only change I made to the install yaml is to add
containerRuntimeExecutor: kubelet
in the ConfigMap.Then I run the following command following the instruction:
However, after I submit a job, the following error appears
Could anyone help to look at this issue? Thanks.
The text was updated successfully, but these errors were encountered: