Not able to view cluster resources after logging in the UI
See original GitHub issueDescription
Two issues
- The manifests for deployment to the cluster is wrong - it should be
-plugins-dir
instead of-plugin-dir
- After login to the UI after creating the ingress not able to see any data from the cluster (logged in via SA token the default one) Impact
[ 1 sentence detailing the impact this bug is creating for you ]
Environment and steps to reproduce
-
Set-up: a managed k3s cluster on Civo (civo.com)
-
Task: first edit the deployment and change the plugin-dir to plugins-dir
-
Action(s): after opening the UI , providing the default SA token for authentication I am not able to view anything inside the cluster
-
Error:
Expected behavior Should be able to see the cluster resources
Issue Analytics
- State:
- Created 3 years ago
- Comments:12 (7 by maintainers)
Top Results From Across the Web
Resolve the Kubernetes object access error in Amazon EKS
1. To find the cluster creator or admin role with primary permissions to configure your cluster, search for the CreateCluster API call in...
Read more >Cluster Service Stops Responding - Windows Server
Before you resume a paused cluster node, you must first determine if a cluster node is paused. Click Start, click Run, type cmd...
Read more >Initial job has not accepted any resources; check your cluster ...
The error indicates that you cluster has insufficient resources for current job.Since you have not started the slaves i.e worker .
Read more >SLEHA 15 SP1 | Administration Guide | Troubleshooting
To make sure the mcastport is not blocked by the firewall, check the firewall settings on each node. Are Pacemaker and Corosync started...
Read more >Chapter 8. Getting started with the pcsd Web UI
Configuring advanced cluster configuration options with the pcsd Web UI; 8.3.2. ... Configuring startup order for resource dependencies not managed by ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Hi @saiyam1814 . Apparently I failed to be clear about the importance of RBAC in Headlamp. Headlamp checks RBACs for any used Service Account should have a role bound with the desired permissions.
I will update the docs.
I am closing this due to inactivity. I believe that we have fixed the issues we were having with this effect. Please reopen if it’s still happening with the latest versions.