Aqib Fayyaz
10/21/2021, 9:59 AMAqib Fayyaz
10/21/2021, 10:09 AMprefect agent kubernetes install -k API_KEY | kubectl apply --namespace=my-namespace -f
it worksAnna Geller
--rbac
is creating a Role
with permissions for Prefect to create Kubernetes jobs, monitor and delete them, and it also creates a RoleBinding
that grants permissions that were defined in the Role to the the default service account.
However, for you it looks like you don’t have permissions to do that. Could it be that you need to enable some API in GCP for it, or that your permissions are somehow restricted?
Apart from that, I could recommend checking this great blog post that shows how to manually create the Role and RoleBinding for Prefect.Aqib Fayyaz
10/21/2021, 10:40 AMAqib Fayyaz
10/21/2021, 10:51 AMAqib Fayyaz
10/21/2021, 11:23 AMAnna Geller
prefect agent kubernetes install --rbac -k YOUR_KEY
This will show the YAML definition of the:
• deployment
• role
• role binding
and if you then pipe apply after that, this YAML definition will be applied to the cluster:
prefect agent kubernetes install --rbac --key API_KEY | kubectl apply --namespace=YOUR_NAMESPACE -f -
Aqib Fayyaz
10/21/2021, 11:33 AMAnna Geller
kubectl apply -f ./skafold.yaml
Aqib Fayyaz
10/21/2021, 11:39 AMAnna Geller
Aqib Fayyaz
10/21/2021, 11:56 AMAnna Geller
Kevin Kho
Aqib Fayyaz
10/21/2021, 3:30 PMAnna Geller
KubernetesRun