You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After numerous and various attempts it does not seem that Headlamp OIDC is working with GKE Identity Service and the only way to login is to use service account token.
server is set to the IP address of the gke-oidc-envoy LB service in "anthos-identity-service" namespace
Default login through kubectl oidc login --login-config=client-config.yaml --cluster=<<CLUSTER_NAME>>
where client-config.yaml is the same client configuration as shown above + clientSecret - works just fine.
I'm able to login with email that's mapped to "oidc:<<MY_EMAIL/USERNAME>>" and with clusterRoleBinding in place I'm able to gain the access.
I cannot get any permissions/access. Moreover I don't see any relevant logs in headlamp at all, only messages like
""events is forbidden: User "system:anonymous" cannot list resource "events" in API group "" at the cluster scope" appearing in the browser console
As such I have a couple of questions:
Is there any working example of Headlamp OIDC with GKE (if any) or is it broken at this point and awaiting a fix?
Is it possible to see/enable some debug logs of Headlamp OIDC flow with API server or at least any hints on that matter in logs?
And on a somewhat unrelated note, is there a way to suppress error message
{"level":"error","source":"/headlamp/backend/cmd/headlamp.go","line":757,"error":"expiry time not found or invalid","time":"2024-12-06T07:41:50Z","message":"failed to get expiry time"}
when using service token without expiry (set as a secret)?
The text was updated successfully, but these errors were encountered:
After numerous and various attempts it does not seem that Headlamp OIDC is working with GKE Identity Service and the only way to login is to use service account token.
server is set to the IP address of the gke-oidc-envoy LB service in "anthos-identity-service" namespace
Default login through
kubectl oidc login --login-config=client-config.yaml --cluster=<<CLUSTER_NAME>>
where client-config.yaml is the same client configuration as shown above + clientSecret - works just fine.
I'm able to login with email that's mapped to "oidc:<<MY_EMAIL/USERNAME>>" and with clusterRoleBinding in place I'm able to gain the access.
In Headlamp though, using the following config:
I cannot get any permissions/access. Moreover I don't see any relevant logs in headlamp at all, only messages like
""events is forbidden: User "system:anonymous" cannot list resource "events" in API group "" at the cluster scope" appearing in the browser console
As such I have a couple of questions:
And on a somewhat unrelated note, is there a way to suppress error message
when using service token without expiry (set as a secret)?
The text was updated successfully, but these errors were encountered: