Commit bb69ae41 authored by Fernando Diaz's avatar Fernando Diaz

Add Step to resolve permission issues when adding Kube Service Account

Adds a step to resolve the issue where an automatically created GKE
cluster does not have permissions to create a Service Account and
ClusterRoleBinding. I encountered these issues when creating my
own GKE cluster and tries to create a Cluster-Admin.
parent 5d94e9d2
...@@ -279,6 +279,19 @@ To add an existing Kubernetes cluster to your project: ...@@ -279,6 +279,19 @@ To add an existing Kubernetes cluster to your project:
kubectl apply -f gitlab-admin-service-account.yaml kubectl apply -f gitlab-admin-service-account.yaml
``` ```
You will need the `container.clusterRoleBindings.create` permission
to create cluster-level roles. If you do not have this permission,
you can alternatively enable Basic Authentication and then run the
`kubectl apply` command as an admin:
```bash
kubectl apply -f gitlab-admin-service-account.yaml --username=admin --password=<password>
```
NOTE: **Note:**
Basic Authentication can be turned on and the password credentials
can be obtained using the Google Cloud Console.
Output: Output:
```bash ```bash
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment