-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend manifests to work properly with kubeadm #22
Conversation
When initializing a local single-node Kubernetes cluster with kubeadm, kube-router is not able to access certaub resources and fails to start. This commit adds a ServiceAccount and a ClusterRoleBinding to the kube-router manifest. This manifest comes from the official kube-router repository: (daemonset/kubeadm-kuberouter-all-features.yaml).
This allows the kubectl checkpoint plugin to create the container checkpoint.
Previously, the curl command could not access the kubelet's client certificate and key.
- Updated with specific instructions for kubeadm - Added instruction to apply the RBAC manifest - Updated the commands of step 9 to run as root - Added a note that the local registry is optional
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: checkpoint-role |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would you be able to add more information on how this RBAC role is used with container checkpointing?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I added a comment on the top of the manifest file.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It looks like this is fixed in the following pull request:
Add ServiceAccount and ClusterRoleBinding to the daemonset manifest
When initializing a local single-node Kubernetes cluster with kubeadm, kube-router is not able to access certaub resources and fails to start. This PR adds a ServiceAccount and a ClusterRoleBinding to the kube-router manifest.
This manifest comes from the official kube-router repository
Add checkpoint-rbac.yaml
This allows the kubectl checkpoint plugin to create the container checkpoint.
Run curl with sudo in kubectl-checkpoint
Previously, the curl command could not access the kubelet's client certificate and key.
Update README.md with kubeadm instructions