-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
brand new 1.7.4 cluster w/o legacy auth : Unknown user \"system:serviceaccount:kube-system:default\"" #2326
Comments
|
I am using the dashboard the cluster creation created, if it's the wrong one maybe we need to fix the gke setup ? any pointer on how to grant whatever is missing / and is it expected it doesn't work out of the box with no instructions on how to fix it? |
You can remove it and deploy one using instructions from our README. It will have admin privileges. |
k thx, will try that in the morning (still think gke setup is wrong that it leads to a non functional dashboard but maybe that's why it's "alpha") |
It's not that. Deploying dashboard by default with full admin privileges is a security risk. People without proper knowledge about kubernetes can easily expose their cluster to breaches. User has to grant privileges on his own and be aware of what he is doing. |
same happens without alpha, it's an rbac issue a (bad?) workaround that makes it work is :
my issue (filled into gke separately, 65286402) is why isn't the install of the dashboard creating a dashboard service account and the dashboard service account not having the right privileges out of the box (or use the client/user's privileges) also is there another role, smaller scope than cluster-admin that would work ? |
There is no way to make it use by default user privileges. Dashboard would need some data about user to impersonate him. In 1.6.3 only way to do that is to create some reverse proxy that will send request header Also there is no way to just set "right privileges" by default as there are not any. Every user will have custom set of privileges that will be default for him. Some people might want to expose dashboard with pure read only privileges and others will grant it full admin privileges. There are just too many combinations to do it for you. That is why GKE by default grants only minimal privileges needed to actually start dashboard and user has to take care of the rest. Read about RBAC and prepare your own SA with correct set of privileges that will work for you. Next release will introduce log in option to dashboard. You will be able to log in using token or basic credentials (if enabled in the cluster). |
add this role for dashboard as follow: kind: ServiceAccount |
cc @andraxylia btw this is the issue that hit us |
Steps to reproduce
Environment
Observed result
Dashboard reported Forbidden (403):
Comments
The text was updated successfully, but these errors were encountered: