使用terraform helm provider安装helm chart时出错`User“client”无法在命名空间“kube-system”中创建deployments.extensions。

问题描述 投票:1回答:2

我正在尝试使用以下terraform脚本使用Helm Provider安装helm

data "google_client_config" "current" {}

provider "helm" {
  tiller_image = "gcr.io/kubernetes-helm/tiller:${var.helm_version}"
  max_history  = 250

  kubernetes {
    host                   = "${google_container_cluster.eu.endpoint}"
    token                  = "${data.google_client_config.current.access_token}"
    client_certificate     = "${base64decode(google_container_cluster.eu.master_auth.0.client_certificate)}"
    client_key             = "${base64decode(google_container_cluster.eu.master_auth.0.client_key)}"
    cluster_ca_certificate = "${base64decode(google_container_cluster.eu.master_auth.0.cluster_ca_certificate)}"
  }
}

resource "helm_release" "mydatabase" {
  name  = "mydatabase"
  chart = "stable/mariadb"

  set {
    name  = "mariadbUser"
    value = "foo"
  }

  set {
    name  = "mariadbPassword"
    value = "qux"
  }
}

但我收到以下错误

* helm_release.mydatabase: 1 error(s) occurred:

* helm_release.mydatabase: error installing: deployments.extensions is forbidden: User "client" cannot create deployments.extensions in the namespace "kube-system"

我认为这种情况发生在terraform helm提供商尝试安装分蘖时,任何人都可以提供帮助

google-cloud-platform terraform google-kubernetes-engine kubernetes-helm
2个回答
0
投票

好的,你是在正确的方式,但..在这里我同意@hk'。

helm_release.mydatabase:安装错误:deployments.extensions被禁止:用户“client”无法在名称空间“kube-system”中创建deployments.extensions

以上错误仅属于授权。在Helm提供商的安装和配置过程中,很多人遇到了困难。例如github open issue。那里有几个想法可以帮助你。

本文介绍了适用于您的内容:helm provider is Pain。它有一个适合人们的解决方案。

试试下一个:

resource "kubernetes_service_account" "tiller" {
  metadata {
    name      = "tiller"
    namespace = "kube-system"
  }

  automount_service_account_token = true
}

resource "kubernetes_cluster_role_binding" "tiller" {
  metadata {
    name = "tiller"
  }

  role_ref {
    kind      = "ClusterRole"
    name      = "cluster-admin"
    api_group = "rbac.authorization.k8s.io"
  }

  subject {
    kind = "ServiceAccount"
    name = "tiller"

    api_group = ""
    namespace = "kube-system"
  }
}

provider "helm" {
  version = "~> 0.7"

  debug           = true
  install_tiller  = true
  service_account = "${kubernetes_service_account.tiller.metadata.0.name}"
  namespace       = "${kubernetes_service_account.tiller.metadata.0.namespace}"
  tiller_image    = "gcr.io/kubernetes-helm/tiller:v2.11.0"

  kubernetes {
    config_path = "~/.kube/${var.env}"
  }
}

要么

resource "kubernetes_service_account" "tiller" {
  metadata {
    name = "tiller"
    namespace = "kube-system"
  }
}
resource "kubernetes_cluster_role_binding" "tiller" {
  metadata {
        name = "tiller"
  }
  subject {
    api_group = "rbac.authorization.k8s.io"
    kind      = "User"
    name      = "system:serviceaccount:kube-system:tiller"
  }

  role_ref {
    api_group = "rbac.authorization.k8s.io"
    kind  = "ClusterRole"
    name = "cluster-admin"
  }
  depends_on = ["kubernetes_service_account.tiller"]
}

provider "helm" {
    tiller_image = "gcr.io/kubernetes-helm/tiller:v2.12.3"
    install_tiller = true
    service_account = "tiller"
    namespace = "kube-system"
}

-1
投票

这是角色和授权相关的问题。使用“helm reset”重置helm然后在命令下运行以解决您的问题。

卷曲https://raw.githubusercontent.com/helm/helm/master/scripts/get> get_helm.sh

chmod 700 get_helm.sh

./个体_helm.是

kubectl create serviceaccount --namespace kube-system tiller

kubectl create clusterrolebinding tiller-cluster-rule --clusterrole = cluster-admin --serviceaccount = kube-system:tiller

helm init

kubectl补丁部署--namespace kube-system tiller-deploy -p'{“spec”:{“template”:{“spec”:{“serviceAccount”:“tiller”}}}}'

© www.soinside.com 2019 - 2024. All rights reserved.