-
Notifications
You must be signed in to change notification settings - Fork 710
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm permission issue on 1.8.1 #106
Comments
I am running it on k8s 1.8 with RBAC on Azure, let me check |
Thanks. I followed this SO post and that appears to have fixed the issue. |
@foxish what's the proper way to setup helm on a GKE cluster running 1.8? Should it just work or is it expected that I have to run commands like the following (from this post)
|
@jlewi, it is expected with RBAC turned on that the permissions will need to be setup for the tiller deployment. There are steps in https://github.com/kubernetes/helm/blob/master/docs/service_accounts.md. For example, with spark, we ship with some instructions and default clusterroles and clusterrolebinding configuration YAMLs. |
Having tiller be cluster-admin is not uncommon, but it would make sense to lock down the operator itself a bit more with its own service account and namespace granting just enough permissions to operate correctly. |
Tiller that is bundled with Azure includes service account and role bindings (as Tfjob CRD sets up it's own serviceaccount and role bindings, so that shouldn't be an issue. Sounds like this is permissions for the tiller itself.
|
@foxish Thanks. I'll send a PR adding to instructions. Just to confirm is RBAC automatically turned on in GKE with 1.8? I didn't see this mentioned in the release notes. |
Yes, RBAC is automatically turned on in GKE with kubernetes 1.8. |
See helm/helm#2962 (comment) for more in-depth instructions on how to configure tiller to work in a RBAC-enabled environment. |
Sorry, yeah, didn't see your comment. Yes, RBAC turns on automatically with 1.8.
|
@sozercan's example works too, but the users should be made well aware that this means if a user has access to tiller, they may install/uninstall anything within their cluster. |
Thanks |
I encountered the same issue. Insert these line to disable RBAC in
|
Just these commands, it'll work kubectl create serviceaccount --namespace kube-system tiller |
Hello I've done just that but it doesn't seem to be enough. I have a test cluster with 3 nodes and the only thing i did was helm init so far..
|
Same here did that as per instructions still run into the same issue. |
using these lines fixed my pb :
Note the error at the end, i'm not sure this command did anything in the end but it worked with all of these. |
kubectl patch deploy --namespace kube-system tiller-deploy -p '{"spec":{"template":{"spec":{"serviceAccount":"tiller"}}}}' |
When I try to install the operator on a 1.8.1 cluster (GKE) like so
I get the error
This looks like an RBAC issue. Previously I was using K8s 1.7 so I guess something changed with 1.8 which is why I'm hitting this now.
@sozercan Any idea what's going on? Is the problem that helm needs to be granted appropriate permissions as mentioned here
The text was updated successfully, but these errors were encountered: