We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The documentation for Role-Based Access Control in Kubernetes Service Discovery informs users to create a role and role binding to allow service pods to access the Kubernetes API resources needed for service discovery.
Google Cloud users have informed us that these instructions don't work unless you have explicitly granted your own user permission to create roles.
See:
These examples show binding the cluster-admin ClusterRole to the current user:
cluster-admin
ClusterRole
kubectl create clusterrolebinding cluster-admin-binding \ --clusterrole cluster-admin --user $(gcloud config get-value account)
It's probably enough to link to Google's guide with a note.
The text was updated successfully, but these errors were encountered:
Successfully merging a pull request may close this issue.
The documentation for Role-Based Access Control in Kubernetes Service Discovery informs users to create a role and role binding to allow service pods to access the Kubernetes API resources needed for service discovery.
Google Cloud users have informed us that these instructions don't work unless you have explicitly granted your own user permission to create roles.
See:
These examples show binding the
cluster-admin
ClusterRole
to the current user:kubectl create clusterrolebinding cluster-admin-binding \ --clusterrole cluster-admin --user $(gcloud config get-value account)
It's probably enough to link to Google's guide with a note.
The text was updated successfully, but these errors were encountered: