Closed willyyang closed 3 weeks ago
I think we may need to tell kopf
to only watch at the namespace scope. You can do this with the --namespace
argument when starting up kopf
.
Could you try adding this to the kopfArgs
in your values.yaml
when installing the helm chart and see if that resolves the problem?
The error messages suggest that this isn't having the desired effect. Could you describe the controller Pod and verify the exact command and arguments that are being passed.
I'm seeing the default --all-namespaces
in the args instead of --namespace=tst
. So I don't think you're setting the config correctly.
Oh yeah looks like you have a typo kopOfArgs
in your command.
No I'm referring to the --set kopOfArgs="{--namespace=tst}"
. You have an extra O
in there. It should be --set kopfArgs="{--namespace=tst}"
.
Thanks!
Glad you got things working @willyyang! In future don't feel like you need to delete comments, it might be useful for future readers to see us working through the debugging steps 😃.
Describe the issue: When running dask-kubernetes-operator in single namespace mode (non-cluster role), the operator fails with RBAC permission errors trying to list resources at cluster scope, despite being configured for namespace-scoped operation. I am trying to set up dask kubernetes using only Roles/Rolebindings (as the default namespace bound helm deployment provides)
Minimal Complete Verifiable Example:
When reviewing the logs from
dask-kubernetes-operator-xx
, I see the following RBAC errors with the common theme being that the serviceaccount is trying to list resources at the cluster scope but doesn't have permissions to do so.:I have tried creating
rolebindings
withclusterroles
which resulted in the same error:If I create
clusterrolebindings
onclusterroles
then thedask-kubernetes-operator
doesn't initialize with any errors. Is it not possible to run the dask-kubernetes-operator without aclusterrolebinding
? :Anything else we need to know?:
Environment: