Kubernetes HelmChart deployment inside of namespace, CRDs problem. #43179
-
Hi everyone. I am trying to deploy a teleport-cluster using a chart inside one of our namespaces. The namespace doesn't have cluster wide permissions, but only for that namespace. We keep on getting the following error:
This is an example of our teleport-release.yaml: apiVersion: helm.toolkit.fluxcd.io/v2beta1
kind: HelmRelease
metadata:
name: teleport
namespace: exp-x
spec:
serviceAccountName: exp-x
targetNamespace: exp-x
releaseName: teleport
install:
crds: Skip
chart:
spec:
chart: ./examples/chart/teleport-cluster
sourceRef:
kind: GitRepository
name: teleport-helm
interval: 10m
values:
chartMode: standalone
clusterName: teleport.example.net
installCRDs: false
auth:
teleportConfig:
# put any teleport.yaml auth configuration overrides here
teleport:
log:
output: stderr
severity: DEBUG
auth_service:
enabled: true
web_idle_timeout: 1h
authentication:
locking_mode: best_effort
proxy:
teleportConfig:
# put any teleport.yaml proxy configuration overrides here
teleport:
log:
output: stderr
severity: DEBUG
proxy_service:
https_keypairs_reload_interval: 12h
https_keypairs:
- key_file:
valueFrom:
secretKeyRef:
name: wildcard-example-tls
key: tls.key
cert_file:
valueFrom:
secretKeyRef:
name: wildcard-example-tls
key: tls.crt
operator:
enabled: false
# If you are running Kubernetes 1.23 or above, disable PodSecurityPolicies
podSecurityPolicy:
enabled: false
My question is. Does the service account needs a read permission to see if the CRD is installed. Or do I need a separate chart for the operator? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Yes, the operator's |
Beta Was this translation helpful? Give feedback.
Yes, the operator's
ServiceAccount
will need permissions to read CRDs cluster-wide. CRD resources can be created inside namespaces, but the actual definitions are cluster-wide.