You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Seldon helm chart provide you with the option of defining your own service account to attach to the Seldon resources. If RBAC is enabled it also attaches different roles necessary for Seldon components to this SA. Compared to the other roleBindings in the helm chart, the one for seldon-leader-election-role has the service account hard coded:
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: seldon-leader-election-role
subjects:
- kind: ServiceAccount
name: seldon-manager
namespace: '{{ include "seldon.namespace" . }}'
The name should be: '{{ .Values.serviceAccount.name}}'
The text was updated successfully, but these errors were encountered:
The Seldon helm chart provide you with the option of defining your own service account to attach to the Seldon resources. If RBAC is enabled it also attaches different roles necessary for Seldon components to this SA. Compared to the other roleBindings in the helm chart, the one for seldon-leader-election-role has the service account hard coded:
The name should be:
'{{ .Values.serviceAccount.name}}'
The text was updated successfully, but these errors were encountered: