You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We need to identify the minimal RBAC permissions required for read-only (get, watch, list) operations on Flux resources in our Kubernetes cluster for use with the Headlamp Flux plugin.
Current behavior
Currently receiving 403 Forbidden errors when attempting to access Flux resources through the Headlamp UI:
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "customresourcedefinitions.apiextensions.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"customresourcedefinitions\" in API group \"apiextensions.k8s.io\" at the cluster scope",
"reason": "Forbidden",
"details": {
"group": "apiextensions.k8s.io",
"kind": "customresourcedefinitions"
},
"code": 403
}
also seeing:
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "serviceaccounts \"sa-support-headlamp\" is forbidden: User \"system:anonymous\" cannot get resource \"serviceaccounts/token\" in API group \"\" in the namespace \"cluster-mgmt\"",
"reason": "Forbidden",
"details": {
"name": "sa-support-headlamp",
"kind": "serviceaccounts"
},
"code": 403
}
Questions
What are the minimal RBAC permissions needed for read-only access to Flux resources?
Why are the requests being processed as "system" instead of using our ServiceAccount?
Is there a specific ClusterRole configuration recommended for the Headlamp Flux plugin?
Are there additional permissions needed for ServiceAccount token operations?
Expected outcome
A minimal ClusterRole configuration that allows read-only access to Flux resources for the Headlamp plugin without granting unnecessary permissions.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
We need to identify the minimal RBAC permissions required for read-only (get, watch, list) operations on Flux resources in our Kubernetes cluster for use with the Headlamp Flux plugin.
Current behavior
Currently receiving 403 Forbidden errors when attempting to access Flux resources through the Headlamp UI:
also seeing:
Questions
Expected outcome
A minimal ClusterRole configuration that allows read-only access to Flux resources for the Headlamp plugin without granting unnecessary permissions.
Beta Was this translation helpful? Give feedback.
All reactions