-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with CRD when namespaced #2234
Comments
@volatilemolotov - I'm having this same issue too. Did you find a work-around? |
Issue still persists, its not causing distruption for me, its just logs spam |
Oh, interesting. It was actually crashing the pod for me in Ambassador 1.2.2, so I worked-around by adding a ClusterRole and Binding giving cluster-level perms. That work-around feels pretty sloppy, so was hoping this might get some attention. |
Yeah i just realised that i also gave it a clusterrole and a clusterrolebinding as a temp fix. Sorry for misleading you. Also hoping that this gets proper attention |
I get the same error as you with following version, as i installed ambassador via helm chart datawire/ambassador. appVersion: 1.3.2 @etotten Is there any problem by asign ClusterRole with multiple ambassador instance? |
Sorry for missing this issue until now all. This is an issue with the RBAC permissions that AES needs. Setting scope.singleNamespace: true configures the chart to install the RBAC resources as Role and RoleBinding instead of ClusterRole and ClusterRoleBinding. With the AES, there is an object that it is looking for the it needs permission to look at the cluster scope for. For this reason, the solution to get Ambassador running in single namespace scoped is to manually set the AMBASSADOR_SINGLE_NAMESPACE environment variable but keep the rbac cluster-scoped. You can do this with manually passing in setting with Or simply setting
in a This will need to be addressed since we should support installing without cluster-scoped RBAC. |
@nbkrause
The role, rolebindung and serviceaccount are created only within the namespace, but the program does not starts due to the "ratelimitservice" resource scanning. Error Message:
|
@zwbear I think your issue is different. You are getting a Yours seems more related to some networking failure in your cluster. |
I get the namespaces ambassador to work with following ClusterRole and ClusterRoleBinding installed before the ambassador installation. I think, the version 6.3.4 still get the same problem as 6.2.3
It seems like, that those three resources ratelimit, filters and filterpolicies works not fine with single namespace. |
Does that means, the cluster-scoped RBAC is still required, even though set the "AMBASSADOR_SINGLE_NAMESPACE: true"? Do we plan to fix this issue in recent version? |
@yxzhm
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I was able to fix this error by correcting the clusterrolebinding that is created by ambassador. The helm chart assigns the namespace in the roleref to 'ambassador'. If ambassador is installed into another namespace the serviceaccount will be able to assume the cluster role. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Looks like there is a fix/workaround for this issue. Please let us know if issues persist on 2.x or 3.x Ambassador versions. |
Describe the bug
When installing Ambassador Edge Stack in namespaced mode (using new chart datawire/ambassasdor) it fails with 'panic: ratelimits.getambassador.io is forbidden: User "system:serviceaccount:a8r-default:ambassador-a8r-default" cannot list resource "ratelimits" in API group "getambassador.io" at the cluster scope'
To Reproduce
Steps to reproduce the behavior:
scope:
singleNamespace: true
Expected behavior
Ambassador should boot normally. It should not try to list ratelimits in cluster scope. It should just list them at namespace scope
Versions (please complete the following information):
Additional context
Similar issue:
#1576
The text was updated successfully, but these errors were encountered: