-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kubens cannot switch if user doesn't have container.namespaces.get permission #19
Comments
kubens just calls If you call You can do some surgery by editing ~/.kube/config, but I'm not exactly sure if that's what you want. |
I was able to duplicate the issue. The way I resolved it was by setting the
It didn't work. |
You're right. It looks like we are looking up all namespaces to see if the namespace we're trying to switch to exists. We need this because I don't want people to be run
We might do a But that's tricky. We'd need to rely on the output message of Can you test if |
|
yeah I'm afraid without |
I believe this is a WONTFIX for now. |
I use kubectx/kns to switch between multiple GKE clusters spread across multiple Google accounts. Occasionally, I'll switch to a context that my current user is unable to access. When I run kns, I get the following:
How would I go about updating the user that kubectx is using so that it uses the correct user? In the past, I've had to create a whole new context to get it working again.
The text was updated successfully, but these errors were encountered: