You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The specified SA in the PubSubPlusEventBroker spec is being set to Broker's StatefuleSet alone and not to the generated PrometheusExporter Deployment. We are using OCP 4.
Hi @cedar715, the Prometheus exporter pod is supposed to use the default service account for the project because this pod requires no special rules added. Is there no default SA in your OpenShift project?
Hi @bczoma, the default SA is present. However, since there is no SCC associated with it, it's not working in OCP. Here's the full error message:
pods "dev3-eventbroker-pubsubplus-prometheus-exporter-d5ff69cff-2wfsh"
is forbidden: unable to validate against any security context
constraint:
[pod.metadata.annotations.container.seccomp.security.alpha.kubernetes.io/exporter:
Forbidden: seccomp may not be set provider "my-scc-1":
Forbidden: not usable by user or serviceaccount provider
"my-scc-2": Forbidden: not usable by user or
serviceaccount provider "my-scc-3": Forbidden: not usable by user or
serviceaccount provider "my-scc-4": Forbidden: not usable by user
or serviceaccount]
If I do these options, it works:
Edit generated deployment spec and add SA which has SCC associated (basically use Broker's SA)
The specified SA in the
PubSubPlusEventBroker
spec is being set to Broker's StatefuleSet alone and not to the generated PrometheusExporter Deployment. We are using OCP 4.Here is our spec:
Here is the Operator generated deployment (edited for brevity):
Since the SA is not set, Prometheus exporter pod is not coming up.
The text was updated successfully, but these errors were encountered: