Ulan Yisaev
06/17/2022, 5:35 PM<http://roles.rbac.authorization.k8s.io|roles.rbac.authorization.k8s.io> "airbyte-admin-role" is forbidden: User "Devuser" cannot get resource "roles" in API group "<http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>"
Please tell me, is it possible to launch Airbyte without creating a separate Service Account? Can we skip this step by making changes to the manifest?Ulan Yisaev
06/17/2022, 5:35 PMulan@wsl2:/mnt/c/Projects/airbyte$ kustomize build kube/overlays/stable | kubectl apply -f -
serviceaccount/airbyte-admin created
configmap/airbyte-env-82bhmh4g56 created
configmap/airbyte-temporal-dynamicconfig created
configmap/sweep-pod-script created
secret/airbyte-secrets-ttfdbcfh47 created
secret/gcs-log-creds created
service/airbyte-db-svc created
service/airbyte-minio-svc created
service/airbyte-temporal-svc created
deployment.apps/airbyte-db created
deployment.apps/airbyte-minio created
deployment.apps/airbyte-pod-sweeper created
deployment.apps/airbyte-server created
deployment.apps/airbyte-temporal created
deployment.apps/airbyte-webapp created
deployment.apps/airbyte-worker created
job.batch/airbyte-bootloader created
Error from server (Forbidden): error when retrieving current configuration of:
Resource: "<http://rbac.authorization.k8s.io/v1|rbac.authorization.k8s.io/v1>, Resource=roles", GroupVersionKind: "<http://rbac.authorization.k8s.io/v1|rbac.authorization.k8s.io/v1>, Kind=Role"
Name: "airbyte-admin-role", Namespace: "dev-namespace"
from server for: "STDIN": <http://roles.rbac.authorization.k8s.io|roles.rbac.authorization.k8s.io> "airbyte-admin-role" is forbidden: User "Devuser" cannot get resource "roles" in API group "<http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>" in the namespace "dev-namespace"
Error from server (Forbidden): error when creating "STDIN": <http://rolebindings.rbac.authorization.k8s.io|rolebindings.rbac.authorization.k8s.io> is forbidden: User "Devuser" cannot create resource "rolebindings" in API group "<http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>" in the namespace "dev-namespace"
Error from server (Forbidden): error when creating "STDIN": services "airbyte-server-svc" is forbidden: exceeded quota: object-quota, requested: services.nodeports=1, used: services.nodeports=0, limited: services.nodeports=0
Error from server (Forbidden): error when creating "STDIN": services "airbyte-webapp-svc" is forbidden: exceeded quota: object-quota, requested: services.nodeports=1, used: services.nodeports=0, limited: services.nodeports=0
Error from server (Forbidden): error when creating "STDIN": persistentvolumeclaims "airbyte-minio-pv-claim" is forbidden: minimum storage usage per PersistentVolumeClaim is 1Gi, but request is 200Mi
Error from server (Forbidden): error when creating "STDIN": persistentvolumeclaims "airbyte-volume-configs" is forbidden: minimum storage usage per PersistentVolumeClaim is 1Gi, but request is 500Mi
Error from server (Forbidden): error when creating "STDIN": persistentvolumeclaims "airbyte-volume-db" is forbidden: minimum storage usage per PersistentVolumeClaim is 1Gi, but request is 500Mi
Ulan Yisaev
06/17/2022, 5:47 PM$ kubectl auth can-i --list
Guy Feldman
06/18/2022, 1:09 AMGuy Feldman
06/18/2022, 1:11 AMUlan Yisaev
06/21/2022, 6:11 PMrules:
- apiGroups: ["*"]
resources: ["jobs", "pods", "pods/log", "pods/exec", "pods/attach"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] # over-permission for now
and they said:
the service account should already have that for jobs, pods and pods/logs. It does not have access to pods/exec or pods/attach and we will not be able to grant that. Regular users do have access to pods/exec and pods/attach for troubleshooting purposes.Ulan Yisaev
06/21/2022, 6:12 PMGuy Feldman
06/21/2022, 6:14 PMGuy Feldman
06/21/2022, 6:17 PMUlan Yisaev
06/21/2022, 6:18 PMUlan Yisaev
06/21/2022, 6:19 PMUlan Yisaev
06/21/2022, 6:20 PMGuy Feldman
06/22/2022, 9:35 PMUlan Yisaev
06/23/2022, 11:14 AMUlan Yisaev
07/03/2022, 7:33 PMINFO i.a.w.p.KubePodProcess(copyFilesToKubeConfigVolume):251 - Waiting for kubectl cp to complete
...
io.airbyte.workers.exception.WorkerException: Error while getting spec from image image_name
...
Caused by: io.airbyte.workers.exception.WorkerException: java.io.IOException: kubectl cp failed with exit code 1
from the logs of init container:
Timeout while attempting to copy to init container, exiting with code 1...