Resource Observability Issue⚓︎
Problem⚓︎
Users can't see resources within the KubeRocketCI dedicated namespace via KubeRocketCI portal:
Cause⚓︎
The problem might be caused by several factors. First of all, default and allowed namespaces may be either unset or set incorrectly. Secondly, service account used for browsing the KubeRocketCI portal may have insufficient permission set. Thirdly, if Keycloak is used for as an authication mechanism, then the problem might be related to improper group membership.
Solution⚓︎
Solution can vary depending on the way users log into the platform, whether it is a service account token or an OpenID Connect mechanism.
Solution 1 (Service Account Token)⚓︎
This solution suits those who use a service account token to log into the KubeRocketCI portal.
To fix the problem, follow the steps below:
-
Check both default and allowed namespace by navigating to the KubeRocketCI portal -> Account Settings -> Cluster.
-
Check access rights of the service account at your disposal using the
kubectl describe
command: -
Сheck the role binding associated with the account:
-
Check permissions of the role used in the role binding:
-
Adjust resources to have sufficient permission set. Refer to the KubeRocketCI Access Model page for more details about permissions required for proper resource visibility.
Solution 2 (Keycloak)⚓︎
This solution suits those who to log into the KubeRocketCI portal Keycloak.
To fix the problem, follow the steps below:
-
Log into your Keycloak portal.
-
Check you user membership among the predefined Keycloak groups. Please refer to the KubeRocketCI Access Model page for details on the available Keycloak groups.
-
Add your user to the groups depending on which permissions you need to grant.