-
Notifications
You must be signed in to change notification settings - Fork 1k
Description
Environment
Control Plane Deployment: Karmada deployed via Helm + Karmada Operator
Cluster Type: Trying to register member clusters to Karmada
Tools Used: karmadactl register
Problem Description
I'm attempting to register member clusters to my Karmada control plane using karmadactl register, but I'm encountering numerous permission issues during the process.
Specific Issues Encountered:
Bootstrap token permission errors:
Error from server (Forbidden): certificatesigningrequests.certificates.k8s.io is forbidden:
User "system:bootstrap:xxxxx" cannot create resource "certificatesigningrequests"
in API group "certificates.k8s.io" at the cluster scope
Anonymous user access issues:
configmaps "cluster-info" is forbidden: User "system:anonymous" cannot get resource "configmaps"
in API group "" in the namespace "kube-public"
My Questions:
Agent Deployment Method: What is the recommended way to deploy Karmada agent when the control plane is deployed via Helm + Karmada Operator?
Missing RBAC Configuration: Am I missing some critical RBAC configurations? I've checked the documentation but didn't find clear instructions for agent deployment in this setup.
karmadactl Compatibility: Is the karmadactl register approach only suitable for control planes that were also deployed using karmadactl init?
Enterprise Concerns: In larger enterprise environments, the karmadactl approach seems less mature because:
It doesn't easily support private image registries