Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

installation error #1318

Closed
ChrisRG711 opened this issue Jan 11, 2019 · 1 comment
Closed

installation error #1318

ChrisRG711 opened this issue Jan 11, 2019 · 1 comment
Assignees
Milestone

Comments

@ChrisRG711
Copy link

I am trying to install voyager via helm in my AKS cluster for a poc. I installed helm and added the repostiory etc. i also have RBAC enabled and it says beta. everytime i run the install it fails shown below

Error: release my-release failed: clusterroles.rbac.authorization.k8s.io "voyager-my-release" is forbidden: attempt to grant extra privileges: [{[] [apiextensions.k8s.io] [customresourcedefinitions] [] []} {[get] [apiregistration.k8s.io] [apiservices] [] []} {[patch] [apiregistration.k8s.io] [apiservices] [] []} {[delete] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[get] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[list] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[watch] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[patch] [admissionregistration.k8s.io] [validatingwebhookconfigurations] [] []} {[] [voyager.appscode.com] [] [] []} {[] [monitoring.coreos.com] [servicemonitors] [] []} {[] [apps] [daemonsets] [] []} {[] [apps] [deployments] [] []} {[] [apps] [replicasets] [] []} {[] [extensions] [ingresses] [] []} {[] [] [replicationcontrollers] [] []} {[] [] [services] [] []} {[] [] [endpoints] [] []} {[] [] [configmaps] [] []} {[get] [] [secrets] [] []} {[list] [] [secrets] [] []} {[watch] [] [secrets] [] []} {[create] [] [secrets] [] []} {[update] [] [secrets] [] []} {[patch] [] [secrets] [] []} {[get] [] [namespaces] [] []} {[list] [] [namespaces] [] []} {[watch] [] [namespaces] [] []} {[create] [] [events] [] []} {[get] [] [pods] [] []} {[list] [] [pods] [] []} {[watch] [] [pods] [] []} {[delete] [] [pods] [] []} {[deletecollection] [] [pods] [] []} {[list] [] [nodes] [] []} {[watch] [] [nodes] [] []} {[get] [] [nodes] [] []} {[get] [] [serviceaccounts] [] []} {[create] [] [serviceaccounts] [] []} {[delete] [] [serviceaccounts] [] []} {[patch] [] [serviceaccounts] [] []} {[get] [rbac.authorization.k8s.io] [rolebindings] [] []} {[create] [rbac.authorization.k8s.io] [rolebindings] [] []} {[delete] [rbac.authorization.k8s.io] [rolebindings] [] []} {[patch] [rbac.authorization.k8s.io] [rolebindings] [] []} {[get] [rbac.authorization.k8s.io] [roles] [] []} {[create] [rbac.authorization.k8s.io] [roles] [] []} {[delete] [rbac.authorization.k8s.io] [roles] [] []} {[patch] [rbac.authorization.k8s.io] [roles] [] []}] user=&{system:serviceaccount:kube-system:default bb0dde3c-15b8-11e9-88ba-32fa26bf7bb2 [system:serviceaccounts system:serviceaccounts:kube-system system:authenticated] map[]} ownerrules=[] ruleResolutionErrors=[clusterroles.rbac.authorization.k8s.io "system:discovery" not found]

I created a role binding based on another thread found similar. no dice. pointers are appreciated.

@tamalsaha
Copy link
Contributor

It seems that you are not cluster admin for this. So, you don't have the permission to create necessary objects on your cluster.

See the line: "attempt to grant extra privileges"

@tamalsaha tamalsaha added this to the 9.0.0 milestone Feb 7, 2019
@tamalsaha tamalsaha self-assigned this Feb 7, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants