You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Starting with k8s 1.32, AuthorizeNodeWithSelectors is enabled by
default:
https://kubernetes.io/docs/reference/access-authn-authz/node/
If the rbac microk8s addon is enabled, the kube-apiserver will
run with "--authorization-mode=RBAC,Node". This means that
kublets (system:node:$node) will no longer be allowed to access
pods that reside on other nodes.
For this reason, the "kill-host-pods.py" script is now getting
access denied errors:
Error from server (Forbidden): pods is forbidden:
User "system:node:myhostname" cannot list resource "pods" in API group ""
at the cluster scope: can only list/watch pods with spec.nodeName field selector
As suggested by the error message, we'll solve it by filtering
pods by the node name.
Fixes: #4802
0 commit comments