-
Notifications
You must be signed in to change notification settings - Fork 922
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prune with namespace requires access to api group "" #1689
Comments
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
if you execute the command with verbosity , per example |
That gives the following output: I0923 08:39:47.618470 2728331 round_trippers.go:463] GET [servername].io:443/api/v1/namespaces?labelSelector=tier%3Dfrontend |
Adding an explicit |
/sig cli |
The first error is actually a warning rather than an error. The command will get executed. The warning was added as part of this issue: kubernetes/kubernetes#110905. You can try using --prune-allowlist flag till this issue is resolved. You can refer to the following documentation for the same: https://kubernetes.io/docs/tasks/manage-kubernetes-objects/declarative-config/#alternative-kubectl-apply-f-directory-prune |
/transfer kubectl |
Is there a namespace in the yaml? This may be caused by the default prune-allowlist which includes the namespace. |
What happened?
Our azure pipeline applies configurations to kubernetes with the
Kubernetes@1
task using theapply
command. This works fine, until I addprune -l tier=frontend
as arguments. I see 2 error lines:The first one is picked up as an error by Azure, but should only be a warning. The second one is where I'm at a loss: why do I need access to this?
What did you expect to happen?
Given an explicit namespace, prune only the resources with matching labels within that namespace, do not require access to anything outside of that
How can we reproduce it (as minimally and precisely as possible)?
task: Kubernetes@1
displayName: Deploy to kubernetes
inputs:
command: apply
arguments: --prune -l tier=frontend
namespace: test
(azure & kubernetes details...)
Anything else we need to know?
No response
Kubernetes version
Cloud provider
OS version
No response
Install tools
No response
Container runtime (CRI) and version (if applicable)
No response
Related plugins (CNI, CSI, ...) and versions (if applicable)
No response
The text was updated successfully, but these errors were encountered: