-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow to run on specific namespaces with restricted permission #46
Comments
#48 I had a similar challenge so have opened a PR. |
Update on this one: @mnbbrown has done a great job, but he did not sign the CLA so we can not merge it |
same issue with me !! |
can someone merge the PR of @mnbbrown please |
Hey all, we'd really like to merge but like most open source projects, we require a CLA signature before we can merge. @mnbbrown if you have questions regarding the CLA, let me know. The PR needs some updating due to recent changes we made elsewhere, but we can handle that on our end. |
@aantn Yes if you cant handle it it will be a pleasure thanks to try it |
Hello, I am not sure this is fully fixed,
|
I got the same issue while listing resources for Services |
Encountering the same issue |
Does #220 fix this? |
It improves for sure compared to the main branch, now it does display the table of deployments for the namespace correctly, but it still tries to get HPA at cluster scope which is not allowed:
|
|
Can you try the lastest commit on #220? Thanks for the patience! |
Good job, it works for me with no error now! |
Wonderful, thanks. In general, we're figuring out how to better support enterprise environments (w/ limited permissions and organizational difficulties in actually getting KRR's recommendations applied after a scan). If you're open to it, would love to chat and get feedback on related areas. |
I sent you a message on linkedIn for follow-up, happy to help. |
Describe the bug
On the cluster I used, I don't have access to all namespaces.
Even if I specify my namespaces, it seems it try to get the resources through a cluster-scoped api instead of a namespaced one.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
It should be able to get the data if I have access to the specified namespace
Thank for krr, it's awesome :)
The text was updated successfully, but these errors were encountered: