-
Notifications
You must be signed in to change notification settings - Fork 858
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
查看helm和kustomize组件类型的应用资源拓扑图时由于K8S权限不够导致报错 #6416
Comments
Hi! To maintain the underlying RBAC rules for the user creating an application, you should enable KubeVela to impersonate the target user when creating the resources. To do that, follow the installation instructions available at: https://kubevela.io/docs/platform-engineers/auth/basic/#installation helm upgrade --install kubevela kubevela/vela-core --create-namespace -n vela-system --set authentication.enabled=true --set authentication.withUser=true --wait For more information, check Partial Identity Impersonation |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
错误信息如下:
collector.go:165] query leaf node resource apiVersion=kustomize.toolkit.fluxcd.io/v1beta2 kind=Kustomization namespace=test name=demo-kustomize2 failure deployments.apps is forbidden: User "xxxxx" cannot list resource "deployments" in API group "apps" at the cluster scope, skip this resource
User "xxxxx"这个帐号在test这个namespace下是具有deployments的读,写权限的,配置的是rolebinding,但由于公司规则并没有配置相关的deployments的clusterRolebinding,所以才导致了上述报错。
有什么办法可以在不配置clusterRolebinding的情况下解决上述报错的问题?
The text was updated successfully, but these errors were encountered: