Kubernetes : Service Accounts Permissions issue with Spring Cloud Data Flow Server Kubernetes : Service Accounts Permissions issue with Spring Cloud Data Flow Server kubernetes kubernetes

Kubernetes : Service Accounts Permissions issue with Spring Cloud Data Flow Server


The latest release of minikube enabled RBAC by default.

For RBAC enabled clusters, we have added a note in the installation section on this matter.

"The latest releases of kubernetes have enabled RBAC on the api-server. If your target platform has RBAC enabled you must ask a cluster-admin to create the roles and role-bindings for you before deploying the dataflow server. They associate the dataflow service account with the roles it needs to be run with."

For minikube, however, you can run the following command and retry installaing.

kubectl create clusterrolebinding add-on-cluster-admin --clusterrole=cluster-admin --serviceaccount=kube-system:default

Alternatively, if you're using the helm-chart, you can disable RBAC and install the chart with the following on minikube.

helm init

helm repo add incubator https://kubernetes-charts-incubator.storage.googleapis.com

helm repo update

helm install --name my-release --set server.service.type=NodePort --set rbac.create=false incubator/spring-cloud-data-flow


From the installation guide, step 7: https://docs.spring.io/spring-cloud-dataflow-server-kubernetes/docs/1.4.0.RELEASE/reference/htmlsingle/#_deploying_using_kubectl

The latest releases of kubernetes have enabled RBAC on the api-server. If your target platform has RBAC enabled you must ask a cluster-admin to create the roles and role-bindings for you before deploying the dataflow server. They associate the dataflow service account with the roles it needs to be run with.

$ kubectl create -f src/kubernetes/server/server-roles.yaml$ kubectl create -f src/kubernetes/server/server-rolebinding.yaml

Did you perform those steps?