full-shoe-26526
09/15/2025, 3:29 AMAUDIT_LEVEL
variable. However, the number of API call logs is too high. I only want to audit the actions performed by administrators. Is there a good way to achieve this?magnificent-france-42174
09/15/2025, 12:59 PMwatch
, get
, and list
permissions on <http://metrics.k8s.io|metrics.k8s.io>
and <http://management.cattle.io|management.cattle.io>
with ranchermetrics
.astonishing-stone-85106
09/15/2025, 3:34 PMastonishing-stone-85106
09/15/2025, 3:38 PMastonishing-stone-85106
09/15/2025, 3:38 PMpowerful-easter-15334
09/17/2025, 4:37 AMancient-dinner-76338
09/17/2025, 6:55 AMbest-appointment-66450
09/19/2025, 1:07 PMabundant-napkin-79526
09/22/2025, 2:29 PMUser.Read.All
and GroupMember.Read.All
should be enough but this doesn't seem to be the case.nutritious-intern-6999
09/24/2025, 10:21 AMminiature-notebook-6405
09/24/2025, 12:12 PMquaint-soccer-60531
09/24/2025, 1:57 PMv2.5.17
and I cannot figure it out. I provision nodes at Hetzner and at some point during the bootstrap of new nodes I receive the following error message in Rancher UI: Ssh: handshake failed: ssh: unable to authenticate, attempted methods [none publickey], no supported methods remain : exit status 1
. Observing /var/log/auth.log
at the new machine I see various successful logins and command executions by Rancher, but at some point they fail with userauth_pubkey: key type ssh-rsa not in PubkeyAcceptedAlgorithms [preauth]
(full log in 🧵). I have a very similar setup on a test cluster using the same OS image where the same works without issues. Any ideas why that happens? Rancher doesn't switch SSH login keys during bootstrap, does it?nice-businessperson-14225
09/24/2025, 4:00 PMdelightful-art-4583
09/25/2025, 9:39 AMnice-businessperson-14225
09/26/2025, 1:31 PMmysterious-cpu-54090
09/29/2025, 5:14 PMflaky-magazine-57823
10/01/2025, 7:50 PMbored-plumber-4694
10/02/2025, 10:35 AMbored-plumber-4694
10/02/2025, 10:37 AM<https://update.k3s.io/v1-release/channels/stable>
elegant-truck-75829
10/03/2025, 9:45 AMclever-analyst-23771
ancient-dinner-76338
10/04/2025, 12:50 AMfast-jelly-79666
10/06/2025, 1:38 PMelegant-truck-75829
10/06/2025, 2:10 PMelegant-truck-75829
10/06/2025, 2:11 PMRancher Monitoring RBAC / Access Issue
We have a shared RKE2 cluster managed through Rancher with two separate projects: ProjectA and ProjectB.
Each project has its own namespaces and standard users — users from ProjectA should not see anything from ProjectB, and vice versa.
Currently:
Only the cluster admin can view Rancher Monitoring (Grafana/Prometheus metrics).
Standard users in ProjectA cannot access the monitoring dashboards.
If I assign the “View All Projects” cluster permission, monitoring becomes accessible — but then users can also see ProjectB resources, which breaks isolation.
Question:
How can I grant ProjectA users access to Rancher Monitoring dashboards only for ProjectA’s namespaces, without giving “View All Projects” permission?
hundreds-cricket-19248
10/06/2025, 6:11 PMhelpful-hospital-59207
10/06/2025, 7:38 PMlimited-pizza-33551
10/07/2025, 6:24 AMbest-appointment-66450
10/07/2025, 1:37 PMfast-keyboard-62644
10/08/2025, 8:57 AMrancher/nginx-ingress-controller:v1.13.3-hardened1
image work outside of RKE (Rancher Kubernetes Engine)? For example, if we are using the official NGINX Ingress Controller on EKS, can we replace the image with the Rancher hardened one?