Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

查看helm和kustomize组件类型的应用资源拓扑图时由于K8S权限不够导致报错 #6416

Open
pbxie opened this issue Dec 18, 2023 · 1 comment

Comments

@pbxie
Copy link

pbxie commented Dec 18, 2023

错误信息如下:
collector.go:165] query leaf node resource apiVersion=kustomize.toolkit.fluxcd.io/v1beta2 kind=Kustomization namespace=test name=demo-kustomize2 failure deployments.apps is forbidden: User "xxxxx" cannot list resource "deployments" in API group "apps" at the cluster scope, skip this resource

User "xxxxx"这个帐号在test这个namespace下是具有deployments的读,写权限的,配置的是rolebinding,但由于公司规则并没有配置相关的deployments的clusterRolebinding,所以才导致了上述报错。

有什么办法可以在不配置clusterRolebinding的情况下解决上述报错的问题?

@dhiguero
Copy link
Collaborator

dhiguero commented Feb 8, 2024

Hi! To maintain the underlying RBAC rules for the user creating an application, you should enable KubeVela to impersonate the target user when creating the resources. To do that, follow the installation instructions available at: https://kubevela.io/docs/platform-engineers/auth/basic/#installation

helm upgrade --install kubevela kubevela/vela-core --create-namespace -n vela-system --set authentication.enabled=true --set authentication.withUser=true --wait

For more information, check Partial Identity Impersonation

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants