question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Quickstart install broke related to Camel-K

See original GitHub issue

https://github.com/syndesisio/syndesis-quickstarts/blob/master/README.md#install-syndesis


bash <(curl -sL https://syndes.is/start)
=====================================================================
SYNDESIS master QUICKSTART

Hybrid integration on OpenShift made easy
=====================================================================

Switched to context "minishift".
---------------------------------------------------------------------
Creating project syndesis
Already on project "syndesis" on server "https://192.168.42.117:8443".
---------------------------------------------------------------------
---------------------------------------------------------------------
Creating ServiceAccount for OAuthClient
serviceaccount "syndesis-oauth-client" created
---------------------------------------------------------------------
---------------------------------------------------------------------
Creating Tempate syndesis
template.template.openshift.io "syndesis" created
---------------------------------------------------------------------

---------------------------------------------------------------------
Creating new-app from syndesis
--> Deploying template "syndesis/syndesis" to project syndesis

     syndesis
     ---------
     Syndesis is deployed to syndesis.192.168.42.117.nip.io.

     * With parameters:
        * ROUTE_HOSTNAME=syndesis.192.168.42.117.nip.io
        * OPENSHIFT_MASTER=https://192.168.42.117:8443
        * OpenShift Console URL=
        * OpenShift project to deploy into=syndesis
        * OpenShift project to be used to authenticate the user against=syndesis
        * OPENSHIFT_OAUTH_CLIENT_SECRET=eyJhbGciOiJSUzI1NiIsImtpZCI6IiJ9.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.ZflA3hBhQXSNul0_mkJw3mvLFzeBubBEAd64DRNd3n2ntcfdRNVUsqxEKR0hB0IULpLQYRyYT2PulAiZXJVg7Prx-5oz0-qWtNWocCn2ekg45wsG6tXC7c0_p5u8wNkEtC6P2yzKRXR1ExrSUNvblbrgELrpM55LSoMuAAW3jh9NTKKKd6ZSGVy77ihMe_fLKv0gWPZ1tyWwJ5QLkBvn-du22rhil4BsleEi-1P_C5h_VUi14HKG1yhROYGjWwOPGMpt4DlHGUmro_qiRBdVPiwchxHSCbW_--m8Llbr1z7iluiQVDFPIQ8z64vMcf3kif-JGDRte3mQaUwo71GdJg
        * Memory Limit=255Mi
        * Namespace=openshift
        * PostgreSQL Connection Username=syndesis
        * PostgreSQL Connection Password=yCS7hrVrcdvSwLbi # generated
        * PostgreSQL Database Name=syndesis
        * PostgreSQL Volume Capacity=1Gi
        * PostgreSQL SampleDB Connection Password=XAUlcJoXhIKpD5l1 # generated
        * Test Support Enabled=false
        * Demo Data Enabled=false
        * Syndesis Image Registry=docker.io
        * Enable Integration Deployment=true
        * Image Stream Namespace=
        * OAuth Cookie Secret=C1J5LAsBlPxm1JEm0O7xH1e0VbEQTvpm # generated
        * SYNDESIS_ENCRYPT_KEY=mKIIjl8piWBFI5MsQIPxcCQvC5tehIwvpO2xDKyTJOi4xr11XnTqpmvDxx07VT1V # generated
        * Prometheus Volume Capacity=1Gi
        * Memory Limit=512Mi
        * Meta Volume Capacity=1Gi
        * Memory Limit=512Mi
        * Memory Limit=800Mi
        * Maximum number of integrations=1
        * Integration state check interval=60
        * Client side state authentication key=f4JFlbJWl4eibcOWH8knrejbb2DfGpwk # generated
        * Client side state encryption key=2ggoNWORoFbnpKVLv5GuXcOAjDHwdws4 # generated
        * Upgrade Volume Capacity=1Gi
        * Expose services via 3scale=false

--> Creating resources ...
    imagestream "syndesis-server" created
    imagestream "syndesis-ui" created
    imagestream "syndesis-meta" created
    imagestream "oauth-proxy" created
    imagestream "prometheus" created
    imagestream "postgres_exporter" created
    imagestream "syndesis-s2i" created
    secret "syndesis-oauth-proxy-cookie-secret" created
    secret "syndesis-server-secret" created
    secret "syndesis-global-config" created
    service "syndesis-ui" created
    deploymentconfig "syndesis-ui" created
    configmap "syndesis-ui-config" created
    configmap "syndesis-db-metrics-config" created
    service "syndesis-db-metrics" created
    deploymentconfig "syndesis-db-metrics" created
    configmap "syndesis-sampledb-config" created
    configmap "syndesis-db-conf" created
    service "syndesis-db" created
    persistentvolumeclaim "syndesis-db" created
    deploymentconfig "syndesis-db" created
    service "syndesis-meta" created
    persistentvolumeclaim "syndesis-meta" created
    deploymentconfig "syndesis-meta" created
    configmap "syndesis-meta-config" created
    service "syndesis-oauthproxy" created
    route "syndesis" created
    deploymentconfig "syndesis-oauthproxy" created
    serviceaccount "syndesis-server" created
    serviceaccount "syndesis-integration" created
    service "syndesis-server" created
    deploymentconfig "syndesis-server" created
    configmap "syndesis-server-config" created
    error: roles.rbac.authorization.k8s.io "camel-k" is forbidden: attempt to grant extra privileges: [PolicyRule{APIGroups:["camel.apache.org"], Resources:["*"], Verbs:["*"]}] user=&{developer b003afc6-3166-11e9-bcd1-b685c02f7447 [system:authenticated:oauth system:authenticated] map[scopes.authorization.openshift.io:[user:full]]} ownerrules=[PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["users"], ResourceNames:["~"], Verbs:["get"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projectrequests"], Verbs:["list"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["clusterroles"], Verbs:["get" "list"]} PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["clusterroles"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["storage.k8s.io"], Resources:["storageclasses"], Verbs:["get" "list"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projects"], Verbs:["list" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]} PolicyRule{NonResourceURLs:["/healthz" "/healthz/*"], Verbs:["get"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projectrequests"], Verbs:["create"]} PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["systemusers" "users"], ResourceNames:["system:admin"], Verbs:["impersonate"]} PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["groups" "systemgroups"], ResourceNames:["system:masters"], Verbs:["impersonate"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews" "selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/docker" "builds/optimizeddocker"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/jenkinspipeline"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/source"], Verbs:["create"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{APIGroups:["" "oauth.openshift.io"], Resources:["oauthaccesstokens" "oauthauthorizetokens"], Verbs:["delete"]} PolicyRule{APIGroups:["authentication.k8s.io"], Resources:["userextras/scopes.authorization.openshift.io"], Verbs:["impersonate"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create" "get"]} PolicyRule{APIGroups:[""], Resources:["pods" "pods/attach" "pods/exec" "pods/portforward" "pods/proxy"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["configmaps" "endpoints" "persistentvolumeclaims" "replicationcontrollers" "replicationcontrollers/scale" "secrets" "serviceaccounts" "services" "services/proxy"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["bindings" "events" "limitranges" "namespaces/status" "pods/log" "pods/status" "replicationcontrollers/status" "resourcequotas" "resourcequotas/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]} PolicyRule{APIGroups:["apps"], Resources:["daemonsets" "deployments" "deployments/rollback" "deployments/scale" "replicasets" "replicasets/scale" "statefulsets" "statefulsets/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["batch"], Resources:["cronjobs" "jobs"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["extensions"], Resources:["daemonsets" "deployments" "deployments/rollback" "deployments/scale" "ingresses" "networkpolicies" "replicasets" "replicasets/scale" "replicationcontrollers/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]} PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings" "roles"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["rolebindings" "roles"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["localresourceaccessreviews" "localsubjectaccessreviews" "subjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "security.openshift.io"], Resources:["podsecuritypolicyreviews" "podsecuritypolicyselfsubjectreviews" "podsecuritypolicysubjectreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs" "buildconfigs/webhooks" "builds"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/log"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs/instantiate" "buildconfigs/instantiatebinary" "builds/clone"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/details"], Verbs:["update"]} PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["admin" "edit" "view"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigs" "deploymentconfigs/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigrollbacks" "deploymentconfigs/instantiate" "deploymentconfigs/rollback"], Verbs:["create"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigs/log" "deploymentconfigs/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreamimages" "imagestreammappings" "imagestreams" "imagestreams/secrets" "imagestreamtags"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get" "update"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projects"], Verbs:["delete" "get" "patch" "update"]} PolicyRule{APIGroups:["" "quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/status"], Verbs:["update"]} PolicyRule{APIGroups:["" "template.openshift.io"], Resources:["processedtemplates" "templateconfigs" "templateinstances" "templates"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["extensions" "networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildlogs"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["resourceaccessreviews" "subjectaccessreviews"], Verbs:["create"]}] ruleResolutionErrors=[]
    error: roles.rbac.authorization.k8s.io "camel-k" not found
    service "todo" created
    route "todo" created
    imagestream "todo" created
    buildconfig "todo" created
    deploymentconfig "todo" created
    rolebinding "syndesis:editors" created
    rolebinding "syndesis:viewers" created
    serviceaccount "syndesis-prometheus" created
    configmap "syndesis-prometheus-config" created
    service "syndesis-prometheus" created
    persistentvolumeclaim "syndesis-prometheus" created
    deploymentconfig "syndesis-prometheus" created
    persistentvolumeclaim "syndesis-upgrade" created
    template "syndesis-upgrade" created
--> Failed

Issue Analytics

  • State:closed
  • Created 5 years ago
  • Comments:8 (4 by maintainers)

github_iconTop GitHub Comments

1reaction
KurtStamcommented, Feb 25, 2019

@rhuss maybe we should containerize the syndesis client tool? I want to avoid new users to check out the source code from github to be able to install it.

0reactions
mmuzikarcommented, Apr 30, 2019

Verified by QE

Read more comments on GitHub >

github_iconTop Results From Across the Web

camel-k/CHANGELOG.md at main · apache/camel-k - GitHub
Apache Camel K is a lightweight integration platform, born on Kubernetes, with serverless superpowers - camel-k/CHANGELOG.md at main · apache/camel-k.
Read more >
Getting Started with Camel K Red Hat Integration 2022.q1
How to install Camel K, set up your development environment, and run example applications. Preface. Making open source more inclusive.
Read more >
Red Hat Fuse Quickstart app "Content Based Router - Java ...
i.e., when built, run and deployed (to "Red Hat Fuse 7.1") the "work" folder is never created. Here is the Java code: package...
Read more >
Apache Camel-K CLI 1.9.2 - Chocolatey Software
Chocolatey is software management automation for Windows that wraps installers, executables, zips, and scripts into compiled packages.
Read more >
Trace distributed Camel K calls with Jaeger - YouTube
Source Repo:https://github.com/weimeilin79/ camel - k -example-jaeger.
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found