Quickstart install broke related to Camel-K
See original GitHub issuehttps://github.com/syndesisio/syndesis-quickstarts/blob/master/README.md#install-syndesis
bash <(curl -sL https://syndes.is/start)
=====================================================================
SYNDESIS master QUICKSTART
Hybrid integration on OpenShift made easy
=====================================================================
Switched to context "minishift".
---------------------------------------------------------------------
Creating project syndesis
Already on project "syndesis" on server "https://192.168.42.117:8443".
---------------------------------------------------------------------
---------------------------------------------------------------------
Creating ServiceAccount for OAuthClient
serviceaccount "syndesis-oauth-client" created
---------------------------------------------------------------------
---------------------------------------------------------------------
Creating Tempate syndesis
template.template.openshift.io "syndesis" created
---------------------------------------------------------------------
---------------------------------------------------------------------
Creating new-app from syndesis
--> Deploying template "syndesis/syndesis" to project syndesis
syndesis
---------
Syndesis is deployed to syndesis.192.168.42.117.nip.io.
* With parameters:
* ROUTE_HOSTNAME=syndesis.192.168.42.117.nip.io
* OPENSHIFT_MASTER=https://192.168.42.117:8443
* OpenShift Console URL=
* OpenShift project to deploy into=syndesis
* OpenShift project to be used to authenticate the user against=syndesis
* OPENSHIFT_OAUTH_CLIENT_SECRET=eyJhbGciOiJSUzI1NiIsImtpZCI6IiJ9.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.ZflA3hBhQXSNul0_mkJw3mvLFzeBubBEAd64DRNd3n2ntcfdRNVUsqxEKR0hB0IULpLQYRyYT2PulAiZXJVg7Prx-5oz0-qWtNWocCn2ekg45wsG6tXC7c0_p5u8wNkEtC6P2yzKRXR1ExrSUNvblbrgELrpM55LSoMuAAW3jh9NTKKKd6ZSGVy77ihMe_fLKv0gWPZ1tyWwJ5QLkBvn-du22rhil4BsleEi-1P_C5h_VUi14HKG1yhROYGjWwOPGMpt4DlHGUmro_qiRBdVPiwchxHSCbW_--m8Llbr1z7iluiQVDFPIQ8z64vMcf3kif-JGDRte3mQaUwo71GdJg
* Memory Limit=255Mi
* Namespace=openshift
* PostgreSQL Connection Username=syndesis
* PostgreSQL Connection Password=yCS7hrVrcdvSwLbi # generated
* PostgreSQL Database Name=syndesis
* PostgreSQL Volume Capacity=1Gi
* PostgreSQL SampleDB Connection Password=XAUlcJoXhIKpD5l1 # generated
* Test Support Enabled=false
* Demo Data Enabled=false
* Syndesis Image Registry=docker.io
* Enable Integration Deployment=true
* Image Stream Namespace=
* OAuth Cookie Secret=C1J5LAsBlPxm1JEm0O7xH1e0VbEQTvpm # generated
* SYNDESIS_ENCRYPT_KEY=mKIIjl8piWBFI5MsQIPxcCQvC5tehIwvpO2xDKyTJOi4xr11XnTqpmvDxx07VT1V # generated
* Prometheus Volume Capacity=1Gi
* Memory Limit=512Mi
* Meta Volume Capacity=1Gi
* Memory Limit=512Mi
* Memory Limit=800Mi
* Maximum number of integrations=1
* Integration state check interval=60
* Client side state authentication key=f4JFlbJWl4eibcOWH8knrejbb2DfGpwk # generated
* Client side state encryption key=2ggoNWORoFbnpKVLv5GuXcOAjDHwdws4 # generated
* Upgrade Volume Capacity=1Gi
* Expose services via 3scale=false
--> Creating resources ...
imagestream "syndesis-server" created
imagestream "syndesis-ui" created
imagestream "syndesis-meta" created
imagestream "oauth-proxy" created
imagestream "prometheus" created
imagestream "postgres_exporter" created
imagestream "syndesis-s2i" created
secret "syndesis-oauth-proxy-cookie-secret" created
secret "syndesis-server-secret" created
secret "syndesis-global-config" created
service "syndesis-ui" created
deploymentconfig "syndesis-ui" created
configmap "syndesis-ui-config" created
configmap "syndesis-db-metrics-config" created
service "syndesis-db-metrics" created
deploymentconfig "syndesis-db-metrics" created
configmap "syndesis-sampledb-config" created
configmap "syndesis-db-conf" created
service "syndesis-db" created
persistentvolumeclaim "syndesis-db" created
deploymentconfig "syndesis-db" created
service "syndesis-meta" created
persistentvolumeclaim "syndesis-meta" created
deploymentconfig "syndesis-meta" created
configmap "syndesis-meta-config" created
service "syndesis-oauthproxy" created
route "syndesis" created
deploymentconfig "syndesis-oauthproxy" created
serviceaccount "syndesis-server" created
serviceaccount "syndesis-integration" created
service "syndesis-server" created
deploymentconfig "syndesis-server" created
configmap "syndesis-server-config" created
error: roles.rbac.authorization.k8s.io "camel-k" is forbidden: attempt to grant extra privileges: [PolicyRule{APIGroups:["camel.apache.org"], Resources:["*"], Verbs:["*"]}] user=&{developer b003afc6-3166-11e9-bcd1-b685c02f7447 [system:authenticated:oauth system:authenticated] map[scopes.authorization.openshift.io:[user:full]]} ownerrules=[PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["users"], ResourceNames:["~"], Verbs:["get"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projectrequests"], Verbs:["list"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["clusterroles"], Verbs:["get" "list"]} PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["clusterroles"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["storage.k8s.io"], Resources:["storageclasses"], Verbs:["get" "list"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projects"], Verbs:["list" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]} PolicyRule{NonResourceURLs:["/healthz" "/healthz/*"], Verbs:["get"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projectrequests"], Verbs:["create"]} PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["systemusers" "users"], ResourceNames:["system:admin"], Verbs:["impersonate"]} PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["groups" "systemgroups"], ResourceNames:["system:masters"], Verbs:["impersonate"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews" "selfsubjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/docker" "builds/optimizeddocker"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/jenkinspipeline"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/source"], Verbs:["create"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]} PolicyRule{APIGroups:["" "oauth.openshift.io"], Resources:["oauthaccesstokens" "oauthauthorizetokens"], Verbs:["delete"]} PolicyRule{APIGroups:["authentication.k8s.io"], Resources:["userextras/scopes.authorization.openshift.io"], Verbs:["impersonate"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create" "get"]} PolicyRule{APIGroups:[""], Resources:["pods" "pods/attach" "pods/exec" "pods/portforward" "pods/proxy"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["configmaps" "endpoints" "persistentvolumeclaims" "replicationcontrollers" "replicationcontrollers/scale" "secrets" "serviceaccounts" "services" "services/proxy"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["bindings" "events" "limitranges" "namespaces/status" "pods/log" "pods/status" "replicationcontrollers/status" "resourcequotas" "resourcequotas/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]} PolicyRule{APIGroups:["apps"], Resources:["daemonsets" "deployments" "deployments/rollback" "deployments/scale" "replicasets" "replicasets/scale" "statefulsets" "statefulsets/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["batch"], Resources:["cronjobs" "jobs"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["extensions"], Resources:["daemonsets" "deployments" "deployments/rollback" "deployments/scale" "ingresses" "networkpolicies" "replicasets" "replicasets/scale" "replicationcontrollers/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]} PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings" "roles"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["rolebindings" "roles"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["localresourceaccessreviews" "localsubjectaccessreviews" "subjectrulesreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "security.openshift.io"], Resources:["podsecuritypolicyreviews" "podsecuritypolicyselfsubjectreviews" "podsecuritypolicysubjectreviews"], Verbs:["create"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs" "buildconfigs/webhooks" "builds"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/log"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs/instantiate" "buildconfigs/instantiatebinary" "builds/clone"], Verbs:["create"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/details"], Verbs:["update"]} PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["admin" "edit" "view"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigs" "deploymentconfigs/scale"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigrollbacks" "deploymentconfigs/instantiate" "deploymentconfigs/rollback"], Verbs:["create"]} PolicyRule{APIGroups:["" "apps.openshift.io"], Resources:["deploymentconfigs/log" "deploymentconfigs/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreamimages" "imagestreammappings" "imagestreams" "imagestreams/secrets" "imagestreamtags"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get" "update"]} PolicyRule{APIGroups:["" "image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]} PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projects"], Verbs:["delete" "get" "patch" "update"]} PolicyRule{APIGroups:["" "quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/status"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "route.openshift.io"], Resources:["routes/status"], Verbs:["update"]} PolicyRule{APIGroups:["" "template.openshift.io"], Resources:["processedtemplates" "templateconfigs" "templateinstances" "templates"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["extensions" "networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildlogs"], Verbs:["create" "delete" "deletecollection" "get" "list" "patch" "update" "watch"]} PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get" "list" "watch"]} PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["resourceaccessreviews" "subjectaccessreviews"], Verbs:["create"]}] ruleResolutionErrors=[]
error: roles.rbac.authorization.k8s.io "camel-k" not found
service "todo" created
route "todo" created
imagestream "todo" created
buildconfig "todo" created
deploymentconfig "todo" created
rolebinding "syndesis:editors" created
rolebinding "syndesis:viewers" created
serviceaccount "syndesis-prometheus" created
configmap "syndesis-prometheus-config" created
service "syndesis-prometheus" created
persistentvolumeclaim "syndesis-prometheus" created
deploymentconfig "syndesis-prometheus" created
persistentvolumeclaim "syndesis-upgrade" created
template "syndesis-upgrade" created
--> Failed
Issue Analytics
- State:
- Created 5 years ago
- Comments:8 (4 by maintainers)
Top Results From Across the Web
camel-k/CHANGELOG.md at main · apache/camel-k - GitHub
Apache Camel K is a lightweight integration platform, born on Kubernetes, with serverless superpowers - camel-k/CHANGELOG.md at main · apache/camel-k.
Read more >Getting Started with Camel K Red Hat Integration 2022.q1
How to install Camel K, set up your development environment, and run example applications. Preface. Making open source more inclusive.
Read more >Red Hat Fuse Quickstart app "Content Based Router - Java ...
i.e., when built, run and deployed (to "Red Hat Fuse 7.1") the "work" folder is never created. Here is the Java code: package...
Read more >Apache Camel-K CLI 1.9.2 - Chocolatey Software
Chocolatey is software management automation for Windows that wraps installers, executables, zips, and scripts into compiled packages.
Read more >Trace distributed Camel K calls with Jaeger - YouTube
Source Repo:https://github.com/weimeilin79/ camel - k -example-jaeger.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@rhuss maybe we should containerize the syndesis client tool? I want to avoid new users to check out the source code from github to be able to install it.
Verified by QE