D
Size: a a a
D
SS
D
SS
D
p
rbac:
create: true
resources: ["pods", "pods/exec", "secrets"]
verbs: ["get", "list", "watch", "create", "patch", "delete"]
clusterWideAccess: true
Error: pods is forbidden: User "system:serviceaccount:dev:gitlab-runner" cannot list resource "pods" in API group "" in the namespace "kube-system"
SS
rbac:
create: true
resources: ["pods", "pods/exec", "secrets"]
verbs: ["get", "list", "watch", "create", "patch", "delete"]
clusterWideAccess: true
Error: pods is forbidden: User "system:serviceaccount:dev:gitlab-runner" cannot list resource "pods" in API group "" in the namespace "kube-system"
А
А
p
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app: gitlab-runner
chart: gitlab-runner-0.23.0
heritage: Tiller
release: gitlab-runner
name: gitlab-runner
rules:
- apiGroups:
- ""
resources:
- pods
- pods/exec
- secrets
verbs:
- get
- list
- watch
- create
- patch
- delete
GG
rbac:
create: true
resources: ["pods", "pods/exec", "secrets"]
verbs: ["get", "list", "watch", "create", "patch", "delete"]
clusterWideAccess: true
Error: pods is forbidden: User "system:serviceaccount:dev:gitlab-runner" cannot list resource "pods" in API group "" in the namespace "kube-system"
GG
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app: gitlab-runner
chart: gitlab-runner-0.23.0
heritage: Tiller
release: gitlab-runner
name: gitlab-runner
rules:
- apiGroups:
- ""
resources:
- pods
- pods/exec
- secrets
verbs:
- get
- list
- watch
- create
- patch
- delete
L
rbac:
create: true
resources: ["pods", "pods/exec", "secrets"]
verbs: ["get", "list", "watch", "create", "patch", "delete"]
clusterWideAccess: true
Error: pods is forbidden: User "system:serviceaccount:dev:gitlab-runner" cannot list resource "pods" in API group "" in the namespace "kube-system"
p
p
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app: gitlab-runner
chart: gitlab-runner-0.23.0
heritage: Tiller
release: gitlab-runner
name: gitlab-runner
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: gitlab-runner
subjects:
- kind: ServiceAccount
name: gitlab-runner
namespace: kube-system
GG
A
p
AA
DS