You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am trying to install voyager via helm in my AKS cluster for a poc. I installed helm and added the repostiory etc. i also have RBAC enabled and it says beta. everytime i run the install it fails shown below
I am trying to install voyager via helm in my AKS cluster for a poc. I installed helm and added the repostiory etc. i also have RBAC enabled and it says beta. everytime i run the install it fails shown below
Error: release my-release failed: clusterroles.rbac.authorization.k8s.io "voyager-my-release" is forbidden: attempt to grant extra privileges: [{[] [apiextensions.k8s.io] [customresourcedefinitions] [] []} {[get] [apiregistration.k8s.io] [apiservices] [] []} {[patch] [apiregistration.k8s.io] [apiservices] [] []} {[delete] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[get] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[list] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[watch] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[patch] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[] [voyager.appscode.com] [] [] []} {[] [monitoring.coreos.com] [servicemonitors] [] []} {[] [apps] [daemonsets] [] []} {[] [apps] [deployments] [] []} {[] [apps] [replicasets] [] []} {[] [extensions] [ingresses] [] []} {[] [] [replicationcontrollers] [] []} {[] [] [services] [] []} {[] [] [endpoints] [] []} {[] [] [configmaps] [] []} {[get] [] [secrets] [] []} {[list] [] [secrets] [] []} {[watch] [] [secrets] [] []} {[create] [] [secrets] [] []} {[update] [] [secrets] [] []} {[patch] [] [secrets] [] []} {[get] [] [namespaces] [] []} {[list] [] [namespaces] [] []} {[watch] [] [namespaces] [] []} {[create] [] [events] [] []} {[get] [] [pods] [] []} {[list] [] [pods] [] []} {[watch] [] [pods] [] []} {[delete] [] [pods] [] []} {[deletecollection] [] [pods] [] []} {[list] [] [nodes] [] []} {[watch] [] [nodes] [] []} {[get] [] [nodes] [] []} {[get] [] [serviceaccounts] [] []} {[create] [] [serviceaccounts] [] []} {[delete] [] [serviceaccounts] [] []} {[patch] [] [serviceaccounts] [] []} {[get] [rbac.authorization.k8s.io] [rolebindings] [] []} {[create] [rbac.authorization.k8s.io] [rolebindings] [] []} {[delete] [rbac.authorization.k8s.io] [rolebindings] [] []} {[patch] [rbac.authorization.k8s.io] [rolebindings] [] []} {[get] [rbac.authorization.k8s.io] [roles] [] []} {[create] [rbac.authorization.k8s.io] [roles] [] []} {[delete] [rbac.authorization.k8s.io] [roles] [] []} {[patch] [rbac.authorization.k8s.io] [roles] [] []}] user=&{system:serviceaccount:kube-system:default bb0dde3c-15b8-11e9-88ba-32fa26bf7bb2 [system:serviceaccounts system:serviceaccounts:kube-system system:authenticated] map[]} ownerrules=[] ruleResolutionErrors=[clusterroles.rbac.authorization.k8s.io "system:discovery" not found]
I created a role binding based on another thread found similar. no dice. pointers are appreciated.
The text was updated successfully, but these errors were encountered: