Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document that GKE requires current user to have cluster-admin role to create new roles #199

Closed
TimMoore opened this issue May 15, 2018 · 0 comments · Fixed by #204
Closed

Comments

@TimMoore
Copy link

The documentation for Role-Based Access Control in Kubernetes Service Discovery informs users to create a role and role binding to allow service pods to access the Kubernetes API resources needed for service discovery.

Google Cloud users have informed us that these instructions don't work unless you have explicitly granted your own user permission to create roles.

See:

These examples show binding the cluster-admin ClusterRole to the current user:

kubectl create clusterrolebinding cluster-admin-binding \
--clusterrole cluster-admin --user $(gcloud config get-value account)

It's probably enough to link to Google's guide with a note.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants