Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Role "dse-operator" fails to create on GKE #17

Open
satishrao84 opened this issue Dec 5, 2019 · 1 comment
Open

Role "dse-operator" fails to create on GKE #17

satishrao84 opened this issue Dec 5, 2019 · 1 comment

Comments

@satishrao84
Copy link

When applying the datastax-operator-manifests on GKE cluster, I get the below error:

[sanupin@lpdosput50934 ~]$ kubectl -n dse apply  -f datastax-operator-manifests.yaml 
serviceaccount/dse-operator created
rolebinding.rbac.authorization.k8s.io/dse-operator created
customresourcedefinition.apiextensions.k8s.io/dsedatacenters.datastax.com created
deployment.apps/dse-operator created
Error from server (Forbidden): error when creating "datastax-operator-manifests.yaml": roles.rbac.authorization.k8s.io "dse-operator" is forbidden: user "[email protected]" (groups=["system:authenticated"]) is attempting to grant RBAC permissions not currently held:
{APIGroups:[""], Resources:["configmaps"], Verbs:["*"]}
{APIGroups:[""], Resources:["endpoints"], Verbs:["*"]}
{APIGroups:[""], Resources:["events"], Verbs:["*"]}
{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}
{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["*"]}
{APIGroups:[""], Resources:["pods"], Verbs:["*"]}
{APIGroups:[""], Resources:["secrets"], Verbs:["*"]}
{APIGroups:[""], Resources:["services"], Verbs:["*"]}
{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["*"]}
{APIGroups:["apps"], Resources:["deployments"], Verbs:["*"]}
{APIGroups:["apps"], Resources:["deployments/finalizers"], ResourceNames:["dse-operator"], Verbs:["update"]}
{APIGroups:["apps"], Resources:["replicasets"], Verbs:["*"]}
{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["*"]}
{APIGroups:["datastax.com"], Resources:["*"], Verbs:["*"]}
{APIGroups:["monitoring.coreos.com"], Resources:["servicemonitors"], Verbs:["get" "create"]}
{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get" "list" "watch" "create"]}

Does that mean I don't have permissions to create those RBAC permissions?

@devdattakulkarni
Copy link

Probably you are right. Check what permissions you have:

https://kubernetes.io/docs/reference/access-authn-authz/authorization/#checking-api-access

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants