Skip to content

Instantly share code, notes, and snippets.

@levlas
Created March 11, 2018 13:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save levlas/c956099b7c9753decf5d97d8a7cb26dd to your computer and use it in GitHub Desktop.
Save levlas/c956099b7c9753decf5d97d8a7cb26dd to your computer and use it in GitHub Desktop.
Error was returned by GKE when I tried to create a new role for fluentbit
Error from server (Forbidden):
error when creating "https://raw.githubusercontent.com/fluent/fluent-bit-kubernetes-logging/master/fluent-bit-role.yaml":
clusterroles.rbac.authorization.k8s.io "fluent-bit-read" is forbidden:
attempt to grant extra privileges:
[PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}
PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}
PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}
PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}
PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}
PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}]
user=&{userName@example.com [system:authenticated] map[authenticator:[GKE]]}
ownerrules=[PolicyRule{Resources:["selfsubjectaccessreviews" "selfsubjectrulesreviews"],
APIGroups:["authorization.k8s.io"], Verbs:["create"]}
PolicyRule{NonResourceURLs:["/api" "/api/*" "/apis" "/apis/*" "/healthz" "/swagger-2.0.0.pb-v1" "/swagger.json"
"/swaggerapi" "/swaggerapi/*" "/version"], Verbs:["get"]}]
ruleResolutionErrors=[]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment